Movatterモバイル変換


[0]ホーム

URL:


US20070028110A1 - Content extractor and analysis system - Google Patents

Content extractor and analysis system
Download PDF

Info

Publication number
US20070028110A1
US20070028110A1US11/194,078US19407805AUS2007028110A1US 20070028110 A1US20070028110 A1US 20070028110A1US 19407805 AUS19407805 AUS 19407805AUS 2007028110 A1US2007028110 A1US 2007028110A1
Authority
US
United States
Prior art keywords
file
server
content
host
files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/194,078
Other versions
US8984636B2 (en
Inventor
Todd Brennan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VMware LLC
Bit 9 Inc
Original Assignee
Bit 9 Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/194,078priorityCriticalpatent/US8984636B2/en
Application filed by Bit 9 IncfiledCriticalBit 9 Inc
Assigned to BIT 9, INC.reassignmentBIT 9, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BRENNAN, TODD F.
Priority to CN200680034493.4Aprioritypatent/CN101569129B/en
Priority to EP06788969.1Aprioritypatent/EP1920338B1/en
Priority to CA2617204Aprioritypatent/CA2617204C/en
Priority to CN201410112822.9Aprioritypatent/CN103984891A/en
Priority to JP2008524253Aprioritypatent/JP2009507271A/en
Priority to PCT/US2006/029714prioritypatent/WO2007016478A2/en
Priority to BRPI0616018-2Aprioritypatent/BRPI0616018A2/en
Publication of US20070028110A1publicationCriticalpatent/US20070028110A1/en
Priority to JP2012046805Aprioritypatent/JP5809084B2/en
Publication of US8984636B2publicationCriticalpatent/US8984636B2/en
Application grantedgrantedCritical
Assigned to CARBON BLACK, INC.reassignmentCARBON BLACK, INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: BIT9, INC.
Assigned to BIT9, INC.reassignmentBIT9, INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: BIT 9, INC.
Assigned to CARBON BLACK, LLCreassignmentCARBON BLACK, LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: CARBON BLACK, INC.
Assigned to VMware LLCreassignmentVMware LLCMERGER (SEE DOCUMENT FOR DETAILS).Assignors: CARBON BLACK, LLC
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and unwanted software. The system can implement centralized policies that allow an administrator to approve, block, quarantine, and log file activities. The system can extract content of interest from a file container, repackage the content of interest as another valid file type, perform hashes on the content of interest, associate the hash of the container with the hash of the repackaged content, transfer the repackaged content, and store the hash with other security-related information.

Description

Claims (27)

US11/194,0782005-07-292005-07-29Content extractor and analysis systemActive2029-04-03US8984636B2 (en)

Priority Applications (9)

Application NumberPriority DateFiling DateTitle
US11/194,078US8984636B2 (en)2005-07-292005-07-29Content extractor and analysis system
CN200680034493.4ACN101569129B (en)2005-07-292006-07-27 Network security system and method
EP06788969.1AEP1920338B1 (en)2005-07-292006-07-27Network security systems and methods
CA2617204ACA2617204C (en)2005-07-292006-07-27Network security systems and methods
CN201410112822.9ACN103984891A (en)2005-07-292006-07-27Network security systems and methods
JP2008524253AJP2009507271A (en)2005-07-292006-07-27 Network security system and method
PCT/US2006/029714WO2007016478A2 (en)2005-07-292006-07-27Network security systems and methods
BRPI0616018-2ABRPI0616018A2 (en)2005-07-292006-07-27 security systems and methods for computer networks
JP2012046805AJP5809084B2 (en)2005-07-292012-03-02 Network security system and method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/194,078US8984636B2 (en)2005-07-292005-07-29Content extractor and analysis system

Publications (2)

Publication NumberPublication Date
US20070028110A1true US20070028110A1 (en)2007-02-01
US8984636B2 US8984636B2 (en)2015-03-17

Family

ID=37695749

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US11/194,078Active2029-04-03US8984636B2 (en)2005-07-292005-07-29Content extractor and analysis system

Country Status (1)

CountryLink
US (1)US8984636B2 (en)

Cited By (61)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070112814A1 (en)*2005-11-122007-05-17Cheshire Stuart DMethods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier
US20080034434A1 (en)*2006-08-032008-02-07Rolf RepasiObtaining network origins of potential software threats
US20080250100A1 (en)*2007-04-032008-10-09Sony CorporationInformation processing apparatus, information processing method and computer program
US20080271147A1 (en)*2007-04-302008-10-30Microsoft CorporationPattern matching for spyware detection
US20090012813A1 (en)*2007-07-062009-01-08Mckesson Financial Holdings LimitedSystems and methods for managing medical information
US20090077428A1 (en)*2007-09-142009-03-19Softkvm LlcSoftware Method And System For Controlling And Observing Computer Networking Devices
US20090172768A1 (en)*2007-12-282009-07-02Huifeng LeMethods and apparatus for operating embedded information technology applications with a service operating system
CN101539772A (en)*2008-01-252009-09-23洛克威尔自动控制技术股份有限公司Product lifecycle management method and apparatus
US20100083380A1 (en)*2008-09-292010-04-01Harris Mark DNetwork stream scanning facility
US20100161608A1 (en)*2008-12-182010-06-24Sumooh Inc.Methods and apparatus for content-aware data de-duplication
US7840958B1 (en)*2006-02-172010-11-23Trend Micro, Inc.Preventing spyware installation
CN101286986B (en)*2008-05-152011-09-14成都市华为赛门铁克科技有限公司Active defense method, device and system
US20110225141A1 (en)*2010-03-122011-09-15Copiun, Inc.Distributed Catalog, Data Store, and Indexing
US20110231374A1 (en)*2010-03-162011-09-22Copiun, Inc.Highly Scalable and Distributed Data De-Duplication
US20120066762A1 (en)*2010-09-132012-03-15Rade TodorovicSystem and method of whitelisting parent virtual images
US8161548B1 (en)2005-08-152012-04-17Trend Micro, Inc.Malware detection using pattern classification
US20120150897A1 (en)*2010-12-082012-06-14International Business Machines CorporationCalculating State of Cryptographic Objects and Generating Search Filter for Querying Cryptographic Objects
US20120198553A1 (en)*2009-09-142012-08-02Junko SuginakaSecure auditing system and secure auditing method
US20140040403A1 (en)*2006-02-092014-02-06John SargentSystem, method and computer program product for gathering information relating to electronic content utilizing a dns server
US8706745B1 (en)*2008-05-302014-04-22Symantec CorporationSystems and methods for determining a file set
US8819655B1 (en)*2007-09-172014-08-26Symantec CorporationSystems and methods for computer program update protection
US9043920B2 (en)2012-06-272015-05-26Tenable Network Security, Inc.System and method for identifying exploitable weak points in a network
US9059956B2 (en)2003-01-312015-06-16Good Technology CorporationAsynchronous real-time retrieval of data
US20150180888A1 (en)*2007-06-052015-06-25Harish BalasubramanianSystem, Method and Computer Program Product for Making a Scan Decision During Communication of Data Over a Network
US9088606B2 (en)2012-07-052015-07-21Tenable Network Security, Inc.System and method for strategic anti-malware monitoring
US9305159B2 (en)2004-12-032016-04-05Fortinet, Inc.Secure system for allowing the execution of authorized computer program code
US20160119375A1 (en)*2013-06-042016-04-28Beijing Qihoo Technology Company LimitedCloud security-based file processing method and apparatus
US20160226901A1 (en)*2015-01-302016-08-04Securonix, Inc.Anomaly Detection Using Adaptive Behavioral Profiles
US9467464B2 (en)2013-03-152016-10-11Tenable Network Security, Inc.System and method for correlating log data to discover network vulnerabilities and assets
CN106096397A (en)*2016-05-262016-11-09倪茂志A kind of prevention method extorting software and system
US9602539B1 (en)*2012-09-282017-03-21Palo Alto Networks, Inc.Externally defined objects in security policy
US9621405B2 (en)2010-08-242017-04-11Good Technology Holdings LimitedConstant access gateway and de-duplicated data cache server
US9628513B2 (en)2007-04-302017-04-18Mcafee, Inc.Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites
US9680848B2 (en)*2014-12-032017-06-13Korea Internet & Security AgencyApparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and API flow-based dynamic analysis
US20170351870A1 (en)*2016-06-032017-12-07Honeywell International Inc.Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system
US9846706B1 (en)*2012-12-282017-12-19EMC IP Holding Company LLCManaging mounting of file systems
CN107948123A (en)*2016-10-122018-04-20阿里巴巴集团控股有限公司Document transmission method and device
CN108804925A (en)*2015-05-272018-11-13安恒通(北京)科技有限公司method and system for detecting malicious code
US10152518B2 (en)*2014-10-302018-12-11The Johns Hopkins UniversityApparatus and method for efficient identification of code similarity
US10225323B2 (en)*2012-09-072019-03-05Oracle International CorporationSystem and method for providing java cloud services for use with a cloud computing environment
US20190121959A1 (en)*2017-08-012019-04-25PC Pitstop, IncSystem, Method, and Apparatus for Computer Security
US10419504B1 (en)*2009-04-102019-09-17Open Invention Network LlcSystem and method for streaming application isolation
US10476936B1 (en)2018-12-132019-11-12Software AgPlugin-based file transfer systems and/or methods
US10496812B2 (en)2013-09-062019-12-03Michael GuidrySystems and methods for security in computer systems
US10592942B1 (en)2009-04-102020-03-17Open Invention Network LlcSystem and method for usage billing of hosted applications
US10606634B1 (en)2009-04-102020-03-31Open Invention Network LlcSystem and method for application isolation
US10693917B1 (en)2009-04-102020-06-23Open Invention Network LlcSystem and method for on-line and off-line streaming application isolation
US10873588B2 (en)2017-08-012020-12-22Pc Matic, Inc.System, method, and apparatus for computer security
US20210026951A1 (en)*2017-08-012021-01-28PC Matic, IncSystem, Method, and Apparatus for Computer Security
US20210034767A1 (en)*2019-08-012021-02-04Palantir Technologies Inc.Systems and methods for conducting data extraction using dedicated data extraction devices
US11237802B1 (en)2020-07-202022-02-01Bank Of America CorporationArchitecture diagram analysis tool for software development
US11314560B1 (en)2009-04-102022-04-26Open Invention Network LlcSystem and method for hierarchical interception with isolated environments
US11323482B2 (en)*2019-12-312022-05-03Mcafee, LlcMethods, systems, and media for protecting computer systems from user-created objects
CN114679410A (en)*2020-12-242022-06-28网神信息技术(北京)股份有限公司 Method, device, electronic device and storage medium for reducing external network resource occupation
US11425170B2 (en)2018-10-112022-08-23Honeywell International Inc.System and method for deploying and configuring cyber-security protection solution using portable storage device
US20220382892A1 (en)*2021-05-272022-12-01Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US11538078B1 (en)2009-04-102022-12-27International Business Machines CorporationSystem and method for usage billing of hosted applications
CN117707608A (en)*2024-02-042024-03-15深圳市分秒网络科技有限公司 Methods and systems for automating configuration file parameters
US20240241980A1 (en)*2021-05-272024-07-18Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US12216785B2 (en)*2022-09-212025-02-04Acronis International GmbhSystems and methods for generating file systems of data sources incompatible with anti-virus scanners
US12229261B1 (en)*2024-05-032025-02-18Halcyon Tech, Inc.Antiransomware file analysis and scoring

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10122753B2 (en)*2014-04-282018-11-06Sophos LimitedUsing reputation to avoid false malware detections
US9917851B2 (en)2014-04-282018-03-13Sophos LimitedIntrusion detection using a heartbeat
GB201915196D0 (en)2014-12-182019-12-04Sophos LtdA method and system for network access control based on traffic monitoring and vulnerability detection using process related information
CN107248951B (en)*2017-08-102018-12-04北京明朝万达科技股份有限公司A kind of post-processing system, method and device
CN107743306B (en)*2017-11-202021-08-24上海动联信息技术股份有限公司Intelligent POS machine WIFI setting method based on multi-password control and intelligent POS machine
RU2739865C2 (en)*2018-12-282020-12-29Акционерное общество "Лаборатория Касперского"System and method of detecting a malicious file

Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4809160A (en)*1985-10-281989-02-28Hewlett-Packard CompanyPrivilege level checking instruction for implementing a secure hierarchical computer system
US4908861A (en)*1987-08-281990-03-13International Business Machines CorporationData authentication using modification detection codes based on a public one way encryption function
US5278901A (en)*1992-04-301994-01-11International Business Machines CorporationPattern-oriented intrusion-detection system and method
US5283830A (en)*1991-12-171994-02-01International Computers LimitedSecurity mechanism for a computer system
US5485575A (en)*1994-11-211996-01-16International Business Machines CorporationAutomatic analysis of a computer virus structure and means of attachment to its hosts
US5495533A (en)*1994-04-291996-02-27International Business Machines CorporationPersonal key archive
US5495571A (en)*1992-09-301996-02-27Microsoft CorporationMethod and system for performing parametric testing of a functional programming interface
US5502815A (en)*1992-03-301996-03-26Cozza; Paul D.Method and apparatus for increasing the speed at which computer viruses are detected
US5613107A (en)*1992-12-221997-03-18Bull, S.A.Method and apparatus for managing file versions in an information processing system based on a predetermined amount of storage media
US5613002A (en)*1994-11-211997-03-18International Business Machines CorporationGeneric disinfection of programs infected with a computer virus
US5708709A (en)*1995-12-081998-01-13Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US5708780A (en)*1995-06-071998-01-13Open Market, Inc.Internet server access control and monitoring systems
US5859966A (en)*1995-10-101999-01-12Data General CorporationSecurity system for computer systems
US6018747A (en)*1997-11-262000-01-25International Business Machines CorporationMethod for generating and reconstructing in-place delta files
US6021510A (en)*1997-11-242000-02-01Symantec CorporationAntivirus accelerator
US6021491A (en)*1996-11-272000-02-01Sun Microsystems, Inc.Digital signatures for data streams and data archives
US6023723A (en)*1997-12-222000-02-08Accepted Marketing, Inc.Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
US6023586A (en)*1998-02-102000-02-08Novell, Inc.Integrity verifying and correcting software
US6026502A (en)*1997-01-272000-02-15Wakayama; HironoriMethod and mechanism for preventing from invading of computer virus and/or hacker
US6026402A (en)*1998-01-072000-02-15Hewlett-Packard CompanyProcess restriction within file system hierarchies
US6026205A (en)*1997-01-212000-02-15Molecular Optoelectronics CorporationCompound optical waveguide and filter applications thereof
US6029256A (en)*1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6029175A (en)*1995-10-262000-02-22Teknowledge CorporationAutomatic retrieval of changed files by a network software agent
US6173284B1 (en)*1997-05-202001-01-09University Of Charlotte City Of CharlotteSystems, methods and computer program products for automatically monitoring police records for a crime profile
US6178508B1 (en)*1995-12-282001-01-23International Business Machines Corp.System for controlling access to encrypted data files by a plurality of users
US6195587B1 (en)*1993-10-292001-02-27Sophos PlcValidity checking
US20020002684A1 (en)*1998-05-012002-01-03Barbara L. FoxIntelligent trust management method and system
US6338149B1 (en)*1998-07-312002-01-08Westinghouse Electric Company LlcChange monitoring system for a computer system
US6338141B1 (en)*1998-09-302002-01-08Cybersoft, Inc.Method and apparatus for computer virus detection, analysis, and removal in real time
US20020004908A1 (en)*2000-07-052002-01-10Nicholas Paul Andrew GaleaElectronic mail message anti-virus system and method
US20020004874A1 (en)*2000-05-012002-01-10Hideyuki AgataApparatus and method for processing information, and program and medium used therefor
US20020004902A1 (en)*2000-07-072002-01-10Eng-Whatt TohSecure and reliable document delivery
US20020005105A1 (en)*2000-05-092002-01-17Mcpherson MathewArrangement of a sound hole and construction of a sound board in an acoustic guitar
US20020005017A1 (en)*2000-03-312002-01-17Jsr CorporationAqueous dispersion for chemical mechanical polishing
US20020019932A1 (en)*1999-06-102002-02-14Eng-Whatt TohCryptographically secure network
US6349311B1 (en)*1999-02-012002-02-19Symantec CorporationStorage of reverse delta updates
US6351776B1 (en)*1999-11-042002-02-26Xdrive, Inc.Shared internet storage resource, user interface system, and method
US20020026576A1 (en)*2000-08-182002-02-28Hewlett-Packard CompanyApparatus and method for establishing trust
US20030004922A1 (en)*2001-06-272003-01-02Ontrack Data International, Inc.System and method for data management
US6505237B2 (en)*1998-07-242003-01-07Siemens Information & Communication Networks, Inc.Method and system for management of message attachments
US6505300B2 (en)*1998-06-122003-01-07Microsoft CorporationMethod and system for secure running of untrusted content
US20030018903A1 (en)*2001-03-192003-01-23Greca Damon G. DellaMethod of containing spread of computer viruses
US20030015973A1 (en)*2001-07-182003-01-23Kevin OvensSolid state traffic light with predictive failure analysis
US6513122B1 (en)*2001-06-292003-01-28Networks Associates Technology, Inc.Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
US6513111B2 (en)*1998-02-092003-01-28Reuters, LtdMethod of controlling software applications specific to a group of users
US6513039B1 (en)*1999-06-242003-01-28International Business Machines CorporationProfile inferencing through automated access control list analysis heuristics
US20030023866A1 (en)*2001-07-262003-01-30Hinchliffe Alex JamesCentrally managed malware scanning
US20030023857A1 (en)*2001-07-262003-01-30Hinchliffe Alexander JamesMalware infection suppression
US20030023560A1 (en)*2001-07-272003-01-30Fujitsu LimitedDesign asset information search system
US20030023864A1 (en)*2001-07-252003-01-30Igor MuttikOn-access malware scanning
US20030023867A1 (en)*2001-07-252003-01-30Thibadeau Robert H.Methods and systems for promoting security in a computer system employing attached storage devices
US6516395B1 (en)*1997-11-202003-02-04Advanced Micro Devices, Inc.System and method for controlling access to a privilege-partitioned address space with a fixed set of attributes
US20030028785A1 (en)*2001-08-012003-02-06Pak Michael Chin-HwanSystem and method for executing computer virus definitions containing general purpose programming language extensions
US20030033308A1 (en)*2001-08-032003-02-13Patel Sujal M.System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
US20030033303A1 (en)*2001-08-072003-02-13Brian CollinsSystem and method for restricting access to secured data
US20040003279A1 (en)*2002-06-282004-01-01Beilinson Craig AdamUser controls for a computer
US20040003274A1 (en)*2002-06-282004-01-01Strom Clifford P.Protecting content on medium from unfettered distribution
US6675205B2 (en)*1999-10-142004-01-06Arcessa, Inc.Peer-to-peer automated anonymous asynchronous file sharing
US6678741B1 (en)*1999-04-092004-01-13Sun Microsystems, Inc.Method and apparatus for synchronizing firmware
US20040010602A1 (en)*2002-07-102004-01-15Van Vleck Paul F.System and method for managing access to digital content via digital rights policies
US6681227B1 (en)*1997-11-192004-01-20Ns Solutions CorporationDatabase system and a method of data retrieval from the system
US6681344B1 (en)*2000-09-142004-01-20Microsoft CorporationSystem and method for automatically diagnosing a computer problem
US6681387B1 (en)*1999-12-012004-01-20Board Of Trustees Of The University Of IllinoisMethod and apparatus for instruction execution hot spot detection and monitoring in a data processing unit
US6684210B1 (en)*1998-04-062004-01-27Matsushita Electric Industrial Co., Ltd.File managing system, file management apparatus, file management method, and program storage medium
US20040019878A1 (en)*2002-07-232004-01-29Sreekrishna KotnurSoftware tool to detect and restore damaged or lost software components
US20040025043A1 (en)*2002-05-222004-02-05Microsoft CorporationSystem and method for identifying potential security risks in controls
US20040031028A1 (en)*2002-08-062004-02-12Aardwork Software LimitedUpdating of software
US20040030913A1 (en)*2002-08-082004-02-12Trend Micro IncorporatedSystem and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same
US6694336B1 (en)*2000-01-252004-02-17Fusionone, Inc.Data transfer and synchronization system
US6694457B2 (en)*2001-03-062004-02-17Hewlett-Packard Development Company, L.P.System and method for monitoring execution of privileged instructions
US6694328B1 (en)*2000-01-132004-02-17International Business Machines CorporationMethod for creating queries on version objects
US20040034794A1 (en)*2000-05-282004-02-19Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20040034638A1 (en)*2002-07-182004-02-19International Business Machines CorporationMethod for analyzing and characterizing the usage pattern of a device
US6697810B2 (en)*2001-04-192004-02-24Vigilance, Inc.Security system for event monitoring, detection and notification system
US6697950B1 (en)*1999-12-222004-02-24Networks Associates Technology, Inc.Method and apparatus for detecting a macro computer virus using static analysis
US20040039921A1 (en)*2000-10-172004-02-26Shyne-Song ChuangMethod and system for detecting rogue software
US20040039924A1 (en)*2001-04-092004-02-26Baldwin Robert W.System and method for security of computing devices
US20040039932A1 (en)*2002-08-232004-02-26Gidon ElazarApparatus, system and method for securing digital documents in a digital appliance
US6839721B2 (en)*2001-01-122005-01-04Hewlett-Packard Development Company, L.P.Integration of a database into file management software for protecting, tracking, and retrieving data
US20050005161A1 (en)*2003-07-042005-01-06Adrian BaldwinServices and secure processing environments
US20050004873A1 (en)*2003-02-032005-01-06Robin PouDistribution and rights management of digital content
US20050004954A1 (en)*2003-07-012005-01-06Hand Held Products, Inc.Systems and methods for expedited data transfer in a communication system using hash segmentation
US20050005168A1 (en)*2003-03-112005-01-06Richard DickVerified personal information database
US20050010806A1 (en)*2003-04-182005-01-13Ounce Labs, Inc.Method and system for detecting privilege escalation vulnerabilities in source code
US20050010804A1 (en)*2002-12-192005-01-13Bruening Derek L.Secure execution of a computer program using a code cache
US20050015592A1 (en)*2003-07-152005-01-20Jeou-Kai LinSystem and method for application and user-based class of security
US20050015675A1 (en)*2003-07-032005-01-20Kolawa Adam K.Method and system for automatic error prevention for computer software
US20050015591A1 (en)*2003-06-122005-01-20International Business Machines CorporationMulti-level multi-user web services security system and method
US20050015760A1 (en)*2003-07-162005-01-20Oleg IvanovAutomatic detection and patching of vulnerable files
US20050022018A1 (en)*2003-06-302005-01-27Symantec CorporationSignature extraction system and method
US20050022016A1 (en)*2002-12-122005-01-27Alexander ShippMethod of and system for heuristically detecting viruses in executable code
US20050022004A1 (en)*2001-04-242005-01-27Microsoft CorporationRobust recognizer of perceptually similar content
US20050021994A1 (en)*2003-07-212005-01-27Barton Christopher AndrewPre-approval of computer files during a malware detection
US20050028002A1 (en)*2003-07-292005-02-03Mihai ChristodorescuMethod and apparatus to detect malicious software
US20050033976A1 (en)*2003-08-042005-02-10Sbc Knowledge Ventures, L.P.Host intrusion detection and isolation
US20050033975A1 (en)*2001-08-172005-02-10Pasi LahtiPreventing virus infection in a computer system
US20050033978A1 (en)*2003-08-082005-02-10Hyser Chris D.Method and system for securing a computer system
US20050033980A1 (en)*2003-08-072005-02-10Willman Bryan MarkProjection of trustworthiness from a trusted environment to an untrusted environment
US7483993B2 (en)*2001-04-062009-01-27Symantec CorporationTemporal access control for computer virus prevention

Family Cites Families (534)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5175852A (en)1987-02-131992-12-29International Business Machines CorporationDistributed file access structure lock
US5201043A (en)1989-04-051993-04-06Intel CorporationSystem using both a supervisor level control bit and a user level control bit to enable/disable memory reference alignment checking
US5144659A (en)1989-04-191992-09-01Richard P. JonesComputer file protection system
JPH0388052A (en)1989-08-311991-04-12Toshiba Corp Security processing method
US5050212A (en)1990-06-201991-09-17Apple Computer, Inc.Method and apparatus for verifying the integrity of a file stored separately from a computer
US5893117A (en)1990-08-171999-04-06Texas Instruments IncorporatedTime-stamped database transaction and version management system
US5579509A (en)1991-02-081996-11-26International Business Machines CorporationApparatus and method for verifying compatibility of system components
ATE124552T1 (en)1991-04-011995-07-15Cray Research Inc CATCHING A PRIVILEGED COMMAND WORD TO CONTROL AN OPERATING SYSTEM.
US5408642A (en)1991-05-241995-04-18Symantec CorporationMethod for recovery of a computer program infected by a computer virus
US5355474A (en)1991-09-271994-10-11Thuraisngham Bhavani MSystem for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification
US5694590A (en)1991-09-271997-12-02The Mitre CorporationApparatus and method for the detection of security violations in multilevel secure databases
IL99747A (en)1991-10-151994-12-29News Datacom LtdFile-secure computer system
WO1993013477A1 (en)1991-12-231993-07-08Onyx Technologies (Usa) Inc.Computer protection device
DK170490B1 (en)1992-04-281995-09-18Multi Inform As Data Processing Plant
GB9205774D0 (en)1992-03-171992-04-29Int Computers LtdComputer security system
US5649095A (en)1992-03-301997-07-15Cozza; Paul D.Method and apparatus for detecting computer viruses through the use of a scan information cache
US5473769A (en)1992-03-301995-12-05Cozza; Paul D.Method and apparatus for increasing the speed of the detecting of computer viruses
US5528490A (en)1992-04-101996-06-18Charles E. Hill & Associates, Inc.Electronic catalog system and method
US5421006A (en)1992-05-071995-05-30Compaq Computer Corp.Method and apparatus for assessing integrity of computer system software
WO1993025024A1 (en)1992-05-261993-12-09Cyberlock Data Intelligence, Inc.Computer virus monitoring system
US5241594A (en)1992-06-021993-08-31Hughes Aircraft CompanyOne-time logon means and methods for distributed computing systems
US5428795A (en)1992-07-311995-06-27International Business Machines CorporationMethod of and apparatus for providing automatic security control of distributions within a data processing system
US5339261A (en)1992-10-221994-08-16Base 10 Systems, Inc.System for operating application software in a safety critical environment
US5327563A (en)1992-11-131994-07-05Hewlett-PackardMethod for locking software files to a specific storage device
US5359730A (en)1992-12-041994-10-25International Business Machines CorporationMethod of operating a data processing system having a dynamic software update facility
JP2501771B2 (en)1993-01-191996-05-29インターナショナル・ビジネス・マシーンズ・コーポレイション Method and apparatus for obtaining multiple valid signatures of an unwanted software entity
US5440723A (en)1993-01-191995-08-08International Business Machines CorporationAutomatic immune system for computers and computer networks
US5448668A (en)1993-07-081995-09-05Perelson; Alan S.Method of detecting changes to a collection of digital signals
US5444850A (en)1993-08-041995-08-22Trend Micro Devices IncorporatedMethod and apparatus for controlling network and workstation access prior to workstation boot
US5615373A (en)1993-08-261997-03-25International Business Machines CorporationData lock management in a distributed file server system determines variable lock lifetime in response to request to access data object
US5664098A (en)1993-09-281997-09-02Bull Hn Information Systems Inc.Dual decor capability for a host system which runs emulated application programs to enable direct access to host facilities for executing emulated system operations
US5566326A (en)1993-09-281996-10-15Bull Hn Information Systems Inc.Copy file mechanism for transferring files between a host system and an emulated file system
US5675771A (en)1993-09-281997-10-07Bull Hn Information Systems Inc.Mechanism for enabling emulation system users to directly invoke a number of host system facilities for executing host procedures either synchronously or asynchronously in a secure manner through automatically created shell mechanisms
US5983012A (en)1993-09-281999-11-09Bull Hn Information Systems Inc.Executing programs of a first system on a second system
US5572711A (en)1993-09-281996-11-05Bull Hn Information Systems Inc.Mechanism for linking together the files of emulated and host system for access by emulated system users
US5475826A (en)1993-11-191995-12-12Fischer; Addison M.Method for protecting a volatile file using a single hash
US5584023A (en)1993-12-271996-12-10Hsu; Mike S. C.Computer system including a transparent and secure file transform mechanism
US5689700A (en)1993-12-291997-11-18Microsoft CorporationUnification of directory service with file system services
US6119151A (en)*1994-03-072000-09-12International Business Machines Corp.System and method for efficient cache management in a distributed file system
US6760840B1 (en)1994-03-152004-07-06Kabushiki Kaisha ToshibaFile editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing
DE69529635T2 (en)1994-03-152003-10-23Toshiba Kawasaki Kk Share a file system with secret file content, version management and asynchronous editing
US6732358B1 (en)1994-03-242004-05-04Ncr CorporationAutomatic updating of computer software
US5572590A (en)1994-04-121996-11-05International Business Machines CorporationDiscrimination of malicious changes to digital information using multiple signatures
US5802275A (en)1994-06-221998-09-01Lucent Technologies Inc.Isolation of non-secure software from secure software to limit virus infection
US5778222A (en)1994-06-271998-07-07International Business Machines CorporationMethod and system for managing access to objects
US5530757A (en)1994-06-281996-06-25International Business Machines CorporationDistributed fingerprints for information integrity verification
EP0696003B1 (en)1994-08-052001-02-28Canon Kabushiki KaishaA method and an apparatus for document processing
DE69427347T2 (en)1994-08-152001-10-31International Business Machines Corp., Armonk Process and system for improved access control based on the roles in distributed and centralized computer systems
US5701463A (en)1994-09-091997-12-23Cheyenne Advanced Technology LimitedMethod of replacing the identity of a file with another as part of a file open request in a computer system
US5537540A (en)1994-09-301996-07-16Compaq Computer CorporationTransparent, secure computer virus detection method and apparatus
US5586301A (en)1994-11-091996-12-17Ybm Technologies, Inc.Personal computer hard disk protection system
US5657470A (en)1994-11-091997-08-12Ybm Technologies, Inc.Personal computer hard disk protection system
JPH08263438A (en)1994-11-231996-10-11Xerox CorpDistribution and use control system of digital work and access control method to digital work
SE517910C2 (en)1994-11-292002-07-30Telia Ab Computer network with access control
JP2912840B2 (en)1994-12-071999-06-28富士通株式会社 File management system
US5956715A (en)1994-12-131999-09-21Microsoft CorporationMethod and system for controlling user access to a resource in a networked computing environment
US5699507A (en)1995-01-171997-12-16Lucent Technologies Inc.Method of identifying similarities in code segments
US5644710A (en)1995-02-131997-07-01Eta Technologies CorporationPersonal access management system
US5689564A (en)1995-02-131997-11-18Eta Technologies CorporationPersonal access management system
US5727061A (en)1995-02-131998-03-10Eta Technologies CorporationPersonal access management systems
US6255943B1 (en)1995-03-292001-07-03Cabletron Systems, Inc.Method and apparatus for distributed object filtering
US5958056A (en)1995-05-261999-09-28Intel CorporationMethod and apparatus for selecting operating voltages in a backplane bus
JP4162099B2 (en)1995-06-022008-10-08富士通株式会社 Device having function to cope with virus infection and storage device thereof
EP0830611A4 (en)1995-06-022007-05-09Cisco Systems IncRemote monitoring of computer programs
US5678041A (en)1995-06-061997-10-14At&TSystem and method for restricting user access rights on the internet based on rating information stored in a relational database
US5819275A (en)1995-06-071998-10-06Trusted Information Systems, Inc.System and method for superimposing attributes on hierarchically organized file systems
GB2301912A (en)1995-06-091996-12-18IbmSecurity for computer system resources
US5799141A (en)1995-06-091998-08-25Qualix Group, Inc.Real-time data protection system and method
US5826269A (en)1995-06-211998-10-20Microsoft CorporationElectronic mail interface for a network server
EP0752652B1 (en)1995-07-031998-12-16Sun Microsystems, Inc.System and method for implementing a hierarchical policy for computer system administration
US5799315A (en)1995-07-071998-08-25Sun Microsystems, Inc.Method and apparatus for event-tagging data files automatically correlated with a time of occurence in a computer system
JPH0934765A (en)1995-07-201997-02-07Fuji Xerox Co LtdFile managing device
US6061795A (en)1995-07-312000-05-09Pinnacle Technology Inc.Network desktop management security system and method
US5757915A (en)1995-08-251998-05-26Intel CorporationParameterized hash functions for access control
US5634053A (en)1995-08-291997-05-27Hughes Aircraft CompanyFederated information management (FIM) system and method for providing data site filtering and translation for heterogeneous databases
JP4014662B2 (en)1995-09-182007-11-28ファナック株式会社 Robot teaching operation panel
US5701458A (en)1995-09-201997-12-23International Business Machines CorporationSystem and method for managing arbitrary subsets of access control lists in a computer network
US5623600A (en)1995-09-261997-04-22Trend Micro, IncorporatedVirus detection and removal apparatus for computer networks
US5826013A (en)1995-09-281998-10-20Symantec CorporationPolymorphic virus detection module
US5854916A (en)1995-09-281998-12-29Symantec CorporationState-based cache for antivirus software
US5696822A (en)1995-09-281997-12-09Symantec CorporationPolymorphic virus detection module
US6366933B1 (en)*1995-10-272002-04-02At&T Corp.Method and apparatus for tracking and viewing changes on the web
US5974568A (en)1995-11-171999-10-26Mci Communications CorporationHierarchical error reporting system
US5692047A (en)1995-12-081997-11-25Sun Microsystems, Inc.System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
US5974455A (en)1995-12-131999-10-26Digital Equipment CorporationSystem for adding new entry to web page table upon receiving web page including link to another web page not having corresponding entry in web page table
AU1206097A (en)1995-12-281997-07-28Eyal DotanMethod for protecting executable software programs against infection by software viruses
US5966715A (en)1995-12-291999-10-12Csg Systems, Inc.Application and database security and integrity system and method
JPH09233068A (en)1996-02-231997-09-05Digital Vision Lab:KkElectronic verification system
US5737523A (en)1996-03-041998-04-07Sun Microsystems, Inc.Methods and apparatus for providing dynamic network file system client authentication
GB9605338D0 (en)1996-03-131996-05-15Arendee LtdImprovements in or relating to computer systems
US5822517A (en)1996-04-151998-10-13Dotan; EyalMethod for detecting infection of software programs by memory resident software viruses
US6138238A (en)1997-12-112000-10-24Sun Microsystems, Inc.Stack-based access control using code and executor identifiers
US20030056103A1 (en)2000-12-182003-03-20Levy Kenneth L.Audio/video commerce application architectural framework
US5978484A (en)1996-04-251999-11-02Microsoft CorporationSystem and method for safety distributing executable objects
US5974309A (en)1996-05-031999-10-26Telefonaktiebolaget L M Ericsson (Publ)Method and apparatus for facilitating law enforcement agency monitoring of cellular telephone calls
US5815654A (en)1996-05-201998-09-29Chrysler CorporationMethod for determining software reliability
DE19625196A1 (en)1996-06-241998-01-02Godi Meyer Gizella Data archiving system
US5987123A (en)1996-07-031999-11-16Sun Microsystems, IncorporatedSecure file system
JPH1027123A (en)1996-07-111998-01-27Toshiba Corp Computer software copy protection
US5692124A (en)1996-08-301997-11-25Itt Industries, Inc.Support of limited write downs through trustworthy predictions in multilevel security of computer network communications
US5832208A (en)*1996-09-051998-11-03Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
US5845067A (en)1996-09-091998-12-01Porter; Jack EdwardMethod and apparatus for document management utilizing a messaging system
US5983350A (en)1996-09-181999-11-09Secure Computing CorporationSecure firewall supporting different levels of authentication based on address or encryption status
US5951698A (en)1996-10-021999-09-14Trend Micro, IncorporatedSystem, apparatus and method for the detection and removal of viruses in macros
US5884325A (en)1996-10-091999-03-16Oracle CorporationSystem for synchronizing shared data between computers
US5832529A (en)1996-10-111998-11-03Sun Microsystems, Inc.Methods, apparatus, and product for distributed garbage collection
US5930792A (en)1996-11-071999-07-27Intervoice Limited PartnershipMonitoring and directing flow of HTML documents for security and access
US6802028B1 (en)1996-11-112004-10-05Powerquest CorporationComputer virus detection and removal
US6044381A (en)1997-09-112000-03-28Puma Technology, Inc.Using distributed history files in synchronizing databases
US5878417A (en)1996-11-201999-03-02International Business Machines CorporationMethod and apparatus for network security in browser based interfaces
US5958051A (en)1996-11-271999-09-28Sun Microsystems, Inc.Implementing digital signatures for data streams and data archives
US6006228A (en)1996-12-111999-12-21Ncr CorporationAssigning security levels to particular documents on a document by document basis in a database
DK2997A (en)1997-01-091997-01-14Hans Jessen Procedure for preventing unauthorized use of computer program
US6317742B1 (en)1997-01-092001-11-13Sun Microsystems, Inc.Method and apparatus for controlling software access to system resources
US5898836A (en)1997-01-141999-04-27Netmind Services, Inc.Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures
WO1998032073A1 (en)1997-01-171998-07-23International Business Machines CorporationProtecting resources in a distributed computer system
US5956481A (en)1997-02-061999-09-21Microsoft CorporationMethod and apparatus for protecting data files on a computer from virus infection
JPH10232878A (en)1997-02-191998-09-02Hitachi Ltd Document management method and apparatus
US5848418A (en)1997-02-191998-12-08Watchsoft, Inc.Electronic file analyzer and selector
US5930801A (en)1997-03-071999-07-27Xerox CorporationShared-data environment in which each file has independent security properties
US5897637A (en)1997-03-071999-04-27Apple Computer, Inc.System and method for rapidly identifying the existence and location of an item in a file
WO1998047259A2 (en)1997-03-101998-10-22Fielder Guy LFile encryption method and system
US6263444B1 (en)1997-03-112001-07-17National Aerospace Laboratory Of Science & Technology AgencyNetwork unauthorized access analysis method, network unauthorized access analysis apparatus utilizing the method, and computer-readable recording medium having network unauthorized access analysis program recorded thereon
US5907848A (en)1997-03-141999-05-25Lakeview Technology, Inc.Method and system for defining transactions from a database log
US5960170A (en)1997-03-181999-09-28Trend Micro, Inc.Event triggered iterative virus detection
US6122631A (en)1997-03-282000-09-19International Business Machines CorporationDynamic server-managed access control for a distributed file system
US5937160A (en)1997-05-011999-08-10Reedy Creek Technologies, Inc.Systems, methods and computer program products for updating hypertext documents via electronic mail
WO1998050843A1 (en)1997-05-021998-11-12Network Associates, Inc.Process-level data security system
EP0980545B1 (en)1997-05-082001-09-26Pinnacle Technology, Inc.Network desktop management security system and method
US6161145A (en)1997-05-082000-12-12International Business Machines CorporationUpdating server-related data at a client
US6123737A (en)1997-05-212000-09-26Symantec CorporationPush deployment of software packages using notification transports
US5948104A (en)1997-05-231999-09-07Neuromedical Systems, Inc.System and method for automated anti-viral file update
US6434607B1 (en)1997-06-192002-08-13International Business Machines CorporationWeb server providing role-based multi-level security
US6061686A (en)1997-06-262000-05-09Digital Equipment CorporationUpdating a copy of a remote document stored in a local computer system
EP0895149B1 (en)1997-07-312003-09-17Siemens AktiengesellschaftComputer system for protecting a file and a method for protecting a file
US6282701B1 (en)1997-07-312001-08-28Mutek Solutions, Ltd.System and method for monitoring and analyzing the execution of computer programs
US5919257A (en)1997-08-081999-07-06Novell, Inc.Networked workstation intrusion detection system
US6006329A (en)1997-08-111999-12-21Symantec CorporationDetection of computer viruses spanning multiple data streams
US6249805B1 (en)1997-08-122001-06-19Micron Electronics, Inc.Method and system for filtering unauthorized electronic mail messages
US5978917A (en)1997-08-141999-11-02Symantec CorporationDetection and elimination of macro viruses
US6275938B1 (en)1997-08-282001-08-14Microsoft CorporationSecurity enhancement for untrusted executable code
US6044469A (en)1997-08-292000-03-28Preview SoftwareSoftware publisher or distributor configurable software security mechanism
US6226652B1 (en)1997-09-052001-05-01International Business Machines Corp.Method and system for automatically detecting collision and selecting updated versions of a set of files
JP3437065B2 (en)1997-09-052003-08-18富士通株式会社 Virus removal method, information processing device, and computer-readable recording medium on which virus removal program is recorded
IL126148A (en)1997-09-092004-02-19Sanctum LtdMethod and system for maintaining restricted operating environments for application programs or operating systems
US5983348A (en)1997-09-101999-11-09Trend Micro IncorporatedComputer network malicious code scanner
US6154775A (en)1997-09-122000-11-28Lucent Technologies Inc.Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules
US5909689A (en)1997-09-181999-06-01Sony CorporationAutomatic update of file versions for files shared by several computers which record in respective file directories temporal information for indicating when the files have been created
US6192108B1 (en)1997-09-192001-02-20Mci Communications CorporationPerforming automated testing using automatically generated logs
US6357008B1 (en)1997-09-232002-03-12Symantec CorporationDynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
US5991856A (en)1997-09-301999-11-23Network Associates, Inc.System and method for computer operating system protection
US5924096A (en)1997-10-151999-07-13Novell, Inc.Distributed database using indexed into tags to tracks events according to type, update cache, create virtual update log on demand
EP0911827B1 (en)1997-10-212011-11-30Sony CorporationRecording and/or reproduction apparatus, file management method and providing medium
US6081894A (en)1997-10-222000-06-27Rvt Technologies, Inc.Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
US6128774A (en)1997-10-282000-10-03Necula; George C.Safe to execute verification of software
US5991772A (en)1997-10-311999-11-23Oracle CorporationMethod and apparatus for restoring a portion of a database
US6073128A (en)1997-10-312000-06-06Oracle CorporationMethod and apparatus for identifying files used to restore a file
US7092914B1 (en)1997-11-062006-08-15Intertrust Technologies CorporationMethods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6119165A (en)1997-11-172000-09-12Trend Micro, Inc.Controlled distribution of application programs in a computer network
US6397329B1 (en)1997-11-212002-05-28Telcordia Technologies, Inc.Method for efficiently revoking digital identities
US6108799A (en)1997-11-212000-08-22International Business Machines CorporationAutomated sample creation of polymorphic and non-polymorphic marcro viruses
US6094731A (en)1997-11-242000-07-25Symantec CorporationAntivirus accelerator for computer networks
US6208986B1 (en)1997-12-152001-03-27International Business Machines CorporationWeb interface and method for accessing and displaying directory information
US6035423A (en)1997-12-312000-03-07Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US5999932A (en)1998-01-131999-12-07Bright Light Technologies, Inc.System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing
US6122738A (en)1998-01-222000-09-19Symantec CorporationComputer file integrity verification
US6141771A (en)1998-02-062000-10-31International Business Machines CorporationMethod and system for providing a trusted machine state
US5987610A (en)1998-02-121999-11-16Ameritech CorporationComputer virus screening methods and systems
US6205482B1 (en)1998-02-192001-03-20Ameritech CorporationSystem and method for executing a request from a client application
US6457130B2 (en)1998-03-032002-09-24Network Appliance, Inc.File access control in a multi-protocol file server
US20010044901A1 (en)1998-03-242001-11-22Symantec CorporationBubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption
US6052531A (en)1998-03-252000-04-18Symantec CorporationMulti-tiered incremental software updating
JPH11282779A (en)1998-03-271999-10-15Matsushita Electric Ind Co Ltd File distribution system
US6263342B1 (en)1998-04-012001-07-17International Business Machines Corp.Federated searching of heterogeneous datastores using a federated datastore object
US6272488B1 (en)1998-04-012001-08-07International Business Machines CorporationManaging results of federated searches across heterogeneous datastores with a federated collection object
US6098079A (en)1998-04-022000-08-01Mitsubishi Electric Information Technology Center America, Inc. (Ita)File version reconciliation using hash codes
US6230316B1 (en)1998-04-172001-05-08Symantec CorporationPatching rebased and realigned executable files
GB2336696B (en)1998-04-242002-12-18Dialog Corp Plc TheAnalysing data files
US6154751A (en)1998-05-142000-11-28International Business Machines CorporationMethod for executing a user-requested CGI program in a new authentication context while protecting operation of a default web server program
US6792540B1 (en)1998-05-282004-09-14Oracle International CorporationData replication security
US6134447A (en)1998-05-292000-10-17Ericsson Inc.System and method for monitoring and barring location applications
US6279111B1 (en)1998-06-122001-08-21Microsoft CorporationSecurity model using restricted tokens
US6308274B1 (en)1998-06-122001-10-23Microsoft CorporationLeast privilege via restricted tokens
US6256393B1 (en)1998-06-232001-07-03General Instrument CorporationAuthorization and access control of software object residing in set-top terminals
US6638314B1 (en)1998-06-262003-10-28Microsoft CorporationMethod of web crawling utilizing crawl numbers
DE19838605A1 (en)1998-08-252000-03-02Siemens Ag Method and device for forming a detection variable that enables detection of digital signing of an electronic file, and method and device for detection that an electronic file has been digitally signed
US6115709A (en)1998-09-182000-09-05Tacit Knowledge Systems, Inc.Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions
US6397381B1 (en)1998-09-212002-05-28Microsoft CorporationSystem and method for repairing a damaged application program
US6237144B1 (en)1998-09-212001-05-22Microsoft CorporationUse of relational databases for software installation
US6401210B1 (en)1998-09-232002-06-04Intel CorporationMethod of managing computer virus infected files
US6711583B2 (en)1998-09-302004-03-23International Business Machines CorporationSystem and method for detecting and repairing document-infecting viruses using dynamic heuristics
US6301670B1 (en)1998-10-062001-10-09Ricoh CorporationMethod and apparatus for erasing data when a problem is identified
US6205558B1 (en)1998-10-072001-03-20Symantec CorporationRecovery of file systems after modification failure
US6230288B1 (en)1998-10-292001-05-08Network Associates, Inc.Method of treating whitespace during virus detection
US6598090B2 (en)1998-11-032003-07-22International Business Machines CorporationCentralized control of software for administration of a distributed computing environment
US6378069B1 (en)1998-11-042002-04-23Nortel Networks LimitedApparatus and methods for providing software updates to devices in a communication network
US6334150B1 (en)1998-11-302001-12-25International Business Machines CorporationData processing system and method for remotely disabling a client computer system
US6263388B1 (en)1998-11-302001-07-17International Business Machines CorporationData processing system and method for remotely disabling network activity in a client computer system
US6163859A (en)1998-12-022000-12-19Support.Com, Inc.Software vault
US6370648B1 (en)1998-12-082002-04-09Visa International Service AssociationComputer network intrusion detection
CA2292041A1 (en)1998-12-222000-06-22Scott Alan ThomsonSoftware program protection mechanism
US6311187B1 (en)1998-12-292001-10-30Sun Microsystems, Inc.Propogating updates efficiently in hierarchically structured data under a push model
US20030191957A1 (en)1999-02-192003-10-09Ari HypponenDistributed computer virus detection and scanning
EP1159799B1 (en)1999-02-262006-07-26Bitwise Designs, Inc.Digital file management and imaging system and method including secure file marking
US6735766B1 (en)1999-03-032004-05-11Microsoft CorporationMethod and computer-readable medium for installing an upgrade to an application program
WO2000054385A1 (en)1999-03-102000-09-14Preview Systems, Inc.User transparent software malfunction detection and reporting
US6725377B1 (en)1999-03-122004-04-20Networks Associates Technology, Inc.Method and system for updating anti-intrusion software
US6829708B1 (en)1999-03-272004-12-07Microsoft CorporationSpecifying security for an element by assigning a scaled value representative of the relative security thereof
US6816596B1 (en)2000-01-142004-11-09Microsoft CorporationEncrypting a digital object based on a key ID selected therefor
CA2365245C (en)1999-03-312008-12-09British Telecommunications Public Limited CompanyServer computer for guaranteeing files integrity
EP1069745A1 (en)1999-07-132001-01-17BRITISH TELECOMMUNICATIONS public limited companyServer computer providing integrity of files stored in it
US6775779B1 (en)1999-04-062004-08-10Microsoft CorporationHierarchical trusted code for content protection in computers
JP3056732B1 (en)1999-04-092000-06-26コナミ株式会社 Computer system, computer program execution method, and computer program recording medium
WO2000064095A1 (en)1999-04-152000-10-26Motorola Inc.Electronic document protection system
US6721795B1 (en)1999-04-262004-04-13America Online, Inc.Data transfer server
WO2000067130A1 (en)1999-04-302000-11-09Fujitsu LimitedFile managing system
US6434615B1 (en)1999-04-302002-08-13Compaq Information Technologies Group, L.P.Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server
JP4212717B2 (en)1999-04-302009-01-21富士通株式会社 File processing unit processing method
US6654746B1 (en)1999-05-032003-11-25Symantec CorporationMethods and apparatuses for single-connection file synchronization workgroup file update
US6574657B1 (en)1999-05-032003-06-03Symantec CorporationMethods and apparatuses for file synchronization and updating using a signature list
US6681331B1 (en)1999-05-112004-01-20Cylant, Inc.Dynamic software system intrusion detection
WO2000072200A1 (en)1999-05-212000-11-30Infraworks CorporationMethod and apparatus for securing files
GB2350449A (en)1999-05-272000-11-29IbmDetecting replication of a computer virus using a counter virus
US6618810B1 (en)1999-05-272003-09-09Dell Usa, L.P.Bios based method to disable and re-enable computers
US20020101998A1 (en)1999-06-102002-08-01Chee-Hong WongFast escrow delivery
US6594671B1 (en)1999-06-142003-07-15International Business Machines CorporationSeparating privileged functions from non-privileged functions in a server instance
TW462025B (en)1999-06-232001-11-01Micro Star Int Co LtdBIOS virus protection method
NL1012435C2 (en)1999-06-252000-12-28Koninkl Kpn Nv System for secure storage and management in a TTP server.
US6643648B1 (en)1999-06-302003-11-04Raf Technology, Inc.Secure, limited-access database system and method
JP2003503795A (en)1999-06-302003-01-28マイクロソフト コーポレイション Method and system for reporting and resolving support incidents
EP1076336A3 (en)1999-07-122002-01-16DCS Desarrollos Tecnologicos S.A.Method and device for storing, selecting and playing digital audio in magnetic memory and electronic security system against unauthorized copies
AU6222900A (en)1999-07-202001-02-05Getlivemusic.ComSystems for digital watermarking and distribution of recorded content
US6779117B1 (en)1999-07-232004-08-17Cybersoft, Inc.Authentication program for a computer operating system
AU779120B2 (en)1999-08-022005-01-06Harris Interactive, Inc.System for protecting information over the internet
US20020009622A1 (en)1999-08-032002-01-24Goodson David M.Sprayable phosphate cementitious coatings and a method and apparatus for the production thereof
GB2354347B (en)1999-08-042003-09-03Internat Federation Of The PhoReproduction control system
US6493744B1 (en)1999-08-162002-12-10International Business Machines CorporationAutomatic rating and filtering of data files for objectionable content
US6959382B1 (en)1999-08-162005-10-25Accela, Inc.Digital signature service
US6647400B1 (en)1999-08-302003-11-11Symantec CorporationSystem and method for analyzing filesystems to detect intrusions
US6826697B1 (en)1999-08-302004-11-30Symantec CorporationSystem and method for detecting buffer overflow attacks
US6301666B1 (en)1999-08-312001-10-09Everdream, Inc.Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system
US6976165B1 (en)1999-09-072005-12-13Emc CorporationSystem and method for secure storage, transfer and retrieval of content addressable information
US6792416B2 (en)1999-09-212004-09-14International Business Machines CorporationManaging results of federated searches across heterogeneous datastores with a federated result set cursor object
US8914361B2 (en)1999-09-222014-12-16Google Inc.Methods and systems for determining a meaning of a document to match the document to content
US6618727B1 (en)1999-09-222003-09-09Infoglide CorporationSystem and method for performing similarity searching
US6324537B1 (en)1999-09-302001-11-27M-Systems Flash Disk Pioneers Ltd.Device, system and method for data access control
US7043553B2 (en)1999-10-072006-05-09Cisco Technology, Inc.Method and apparatus for securing information access
US6594780B1 (en)1999-10-192003-07-15Inasoft, Inc.Operating system and data protection
US6430561B1 (en)1999-10-292002-08-06International Business Machines CorporationSecurity policy for protection of files on a storage device
US6453347B1 (en)1999-10-292002-09-17Mcafee.Com, Inc.Active marketing based on client computer configurations
US6631480B2 (en)1999-11-102003-10-07Symantec CorporationMethods and systems for protecting data from potential corruption by a crashed computer program
US6738775B2 (en)1999-11-302004-05-18Base One International Corp.Database communication system and method for communicating with a database
US6728886B1 (en)1999-12-012004-04-27Trend Micro IncorporatedDistributed virus scanning arrangements and methods therefor
US6550061B1 (en)1999-12-022003-04-15Dell Usa, L.P.System and method for modifying configuration files in a secured operating system
US6742023B1 (en)2000-04-282004-05-25Roxio, Inc.Use-sensitive distribution of data files between users
JP3546787B2 (en)*1999-12-162004-07-28インターナショナル・ビジネス・マシーンズ・コーポレーション Access control system, access control method, and storage medium
ES2304929T3 (en)1999-12-212008-11-01Contentguard Holdings, Inc. METHOD TO TRANSFER THE RIGHTS TO DECODE MONTHLY.
WO2001048582A2 (en)1999-12-242001-07-05Ravenpack AgMethod and device for presenting data to a user
GB2353372B (en)1999-12-242001-08-22F Secure OyjRemote computer virus scanning
WO2001048634A2 (en)1999-12-272001-07-05Texar Software Corp.Virtual resource attribute directory
US6654888B1 (en)1999-12-312003-11-25International Business Machines CorporationInstalling and controlling trial software
EP1315067B1 (en)2000-01-062006-07-26International Business Machines CorporationMethod and system for using a virus free file certificate
US6735700B1 (en)2000-01-112004-05-11Network Associates Technology, Inc.Fast virus scanning using session stamping
US6763466B1 (en)2000-01-112004-07-13Networks Associates Technology, Inc.Fast virus scanning
US6772340B1 (en)2000-01-142004-08-03Microsoft CorporationDigital rights management system operating on computing device and having black box tied to computing device
US6785818B1 (en)2000-01-142004-08-31Symantec CorporationThwarting malicious registry mapping modifications and map-loaded module masquerade attacks
WO2001053909A2 (en)2000-01-182001-07-26Telcordia Technologies, Inc.Method and systems for data security
US6721767B2 (en)2000-01-312004-04-13Commvault Systems, Inc.Application specific rollback in a computer system
US7293175B2 (en)2000-06-292007-11-06Lockheed Martin CorporationAutomatic information sanitizer
US6704730B2 (en)2000-02-182004-03-09Avamar Technologies, Inc.Hash file system and method for use in a commonality factoring system
US6560776B1 (en)2000-02-182003-05-06Avaya Technology Corp.Software installation verification tool
US6594665B1 (en)2000-02-182003-07-15Intel CorporationStoring hashed values of data in media to allow faster searches and comparison of data
US20010032188A1 (en)2000-02-252001-10-18Yoshiyuki MiyabeInformation distribution system
IL151455A0 (en)2000-03-032003-04-10Sanctum LtdSystem for determining web application vulnerabilities
CA2299946A1 (en)2000-03-032001-09-03Destiny Software Productions Inc.Digital media distribution method and system
US6775780B1 (en)2000-03-162004-08-10Networks Associates Technology, Inc.Detecting malicious software by analyzing patterns of system calls generated during emulation
AU2001250952A1 (en)2000-03-222001-10-03Interwoven, Inc.Method and apparatus for storing changes to file attributes without having to store an additional copy of the file contents
US6842861B1 (en)2000-03-242005-01-11Networks Associates Technology, Inc.Method and system for detecting viruses on handheld computers
WO2001073533A1 (en)2000-03-282001-10-04The Wingard CompanySystem and method for safeguarding electronic files and digital information in a network environment
US6658406B1 (en)2000-03-292003-12-02Microsoft CorporationMethod for selecting terms from vocabularies in a category-based system
US6856993B1 (en)2000-03-302005-02-15Microsoft CorporationTransactional file system
US6748534B1 (en)2000-03-312004-06-08Networks Associates, Inc.System and method for partitioned distributed scanning of a large dataset for viruses and other malware
US6826609B1 (en)2000-03-312004-11-30Tumbleweed Communications Corp.Policy enforcement in a secure data file delivery system
US6823398B1 (en)2000-03-312004-11-23Dphi Acquisitions, Inc.File system management embedded in a storage device
US6820082B1 (en)2000-04-032004-11-16Allegis CorporationRule based database security system and method
KR20010096814A (en)2000-04-142001-11-08홍기융Digital Signature Certificate Based Security Kernel Method for File System Protection
WO2001082033A1 (en)2000-04-192001-11-01Syntion AgMethod for detecting the utilization of a computer program in a billable manner
US6640317B1 (en)2000-04-202003-10-28International Business Machines CorporationMechanism for automated generic application damage detection and repair in strongly encapsulated application
US6754718B1 (en)2000-05-102004-06-22Emc CorporationPushing attribute information to storage devices for network topology access
US20010042204A1 (en)2000-05-112001-11-15David BlakerHash-ordered databases and methods, systems and computer program products for use of a hash-ordered database
DE60128290T2 (en)2000-05-112007-08-30Matsushita Electric Industrial Co., Ltd., Kadoma Device for file management
US20020062258A1 (en)2000-05-182002-05-23Bailey Steven C.Computer-implemented procurement of items using parametric searching
MXPA02011760A (en)2000-05-312003-04-10Matsushita Electric Ind Co LtdInformation recording medium, information recording method, information recording apparatus, information reproducing method, and information reproducing apparatus.
US6640287B2 (en)2000-06-102003-10-28Hewlett-Packard Development Company, L.P.Scalable multiprocessor system and cache coherence method incorporating invalid-to-dirty requests
US6711572B2 (en)2000-06-142004-03-23Xosoft Inc.File system for distributing content in a data network and related methods
US6785721B1 (en)*2000-06-192004-08-31International Business Machines CorporationSystem and method for providing a distributable runtime that deploys web applications and services from a workflow, enterprise, and mail-enabled web application server and platform
US7669238B2 (en)2000-06-212010-02-23Microsoft CorporationEvidence-based application security
GB2364404B (en)2000-07-012002-10-02Marconi Comm LtdMethod of detecting malicious code
US7251728B2 (en)2000-07-072007-07-31Message Secure CorporationSecure and reliable document delivery using routing lists
US6470329B1 (en)2000-07-112002-10-22Sun Microsystems, Inc.One-way hash functions for distributed data synchronization
US7210040B2 (en)2000-07-142007-04-24Computer Associates Think, Inc.Detection of suspicious privileged access to restricted computer resources
US7350204B2 (en)2000-07-242008-03-25Microsoft CorporationPolicies for secure software execution
US6711557B1 (en)2000-08-142004-03-23Adobe Systems IncorporatedClient-based background update monitoring
US6732125B1 (en)2000-09-082004-05-04Storage Technology CorporationSelf archiving log structured volume with intrinsic data protection
US6785732B1 (en)2000-09-112004-08-31International Business Machines CorporationWeb server apparatus and method for virus checking
JP2004509398A (en)2000-09-142004-03-25プロビックス・インコーポレイテッド System for establishing an audit trail for the protection of objects distributed over a network
US6802012B1 (en)2000-10-032004-10-05Networks Associates Technology, Inc.Scanning computer files for unwanted properties
US6757830B1 (en)2000-10-032004-06-29Networks Associates Technology, Inc.Detecting unwanted properties in received email messages
GB0024919D0 (en)2000-10-112000-11-22Sealedmedia LtdMethod of further securing an operating system
US20020048372A1 (en)2000-10-192002-04-25Eng-Whatt TohUniversal signature object for digital data
US6970939B2 (en)2000-10-262005-11-29Intel CorporationMethod and apparatus for large payload distribution in a network
EP1202148A1 (en)2000-10-312002-05-02Hewlett-Packard Company, A Delaware CorporationVirus check on altered data
EP1330890B1 (en)2000-11-032008-06-25Digital Authentication Technologies Inc.Electronic file protection using location
US7343324B2 (en)2000-11-032008-03-11Contentguard Holdings Inc.Method, system, and computer readable medium for automatically publishing content
US6715106B1 (en)2000-11-102004-03-30Dell Products L.P.Bios corruption detection system and method
US7322047B2 (en)2000-11-132008-01-22Digital Doors, Inc.Data security system and method associated with data mining
EP1350167A4 (en)2000-11-162007-10-24Dlj Long Term Invest CorpSystem and method for application-level security
US7660902B2 (en)2000-11-202010-02-09Rsa Security, Inc.Dynamic file access control and management
JP2004515166A (en)2000-11-282004-05-20スイベル テクノロジーズ リミテッド Secure file transfer method and system
US7003551B2 (en)2000-11-302006-02-21Bellsouth Intellectual Property Corp.Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
EP1340170A1 (en)2000-12-082003-09-03IPC GmbhMethod and system for supplying information via a communication network
US7150045B2 (en)2000-12-142006-12-12Widevine Technologies, Inc.Method and apparatus for protection of electronic media
US6708174B1 (en)2000-12-202004-03-16I2 Technologies, Inc.System and method for retrieving information according to improved matching criteria
US7296070B2 (en)2000-12-222007-11-13Tier-3 Pty. Ltd.Integrated monitoring system
US6985586B2 (en)2000-12-222006-01-10Nagracard S.A.Distributed information and storage system
US7058667B2 (en)2000-12-272006-06-06Microsoft CorporationMethod and system for creating and maintaining version-specific properties in a file
US20020087876A1 (en)2000-12-282002-07-04Larose Gordon EdwardAdaptive software installation process supporting multiple layers of security-related attributes
GB2371125A (en)2001-01-132002-07-17Secr DefenceComputer protection system
US6684224B2 (en)2001-01-162004-01-27Chipdata, Inc.Remote database update method and apparatus
US7386513B2 (en)2001-01-172008-06-10Contentguard Holdings, Inc.Networked services licensing system and method
EP1225513A1 (en)2001-01-192002-07-24Eyal DotanMethod for protecting computer programs and data from hostile code
US7057993B2 (en)2001-01-292006-06-06Eastman Kodak CompanyCopy protection using multiple security levels on a programmable CD-ROM
US7406529B2 (en)2001-02-092008-07-29Yahoo! Inc.System and method for detecting and verifying digitized content over a computer network
US20020111911A1 (en)2001-02-132002-08-15Kennedy Kelli HodgeDocument distribution system and method with consolidated document services management
US7213146B2 (en)2001-02-202007-05-01Hewlett-Packard Development Company, L.P.System and method for establishing security profiles of computers
US7272724B2 (en)2001-02-202007-09-18Mcafee, Inc.User alerts in an anti computer virus system
GB2372595A (en)2001-02-232002-08-28Hewlett Packard CoMethod of and apparatus for ascertaining the status of a data processing environment.
US6829355B2 (en)2001-03-052004-12-07The United States Of America As Represented By The National Security AgencyDevice for and method of one-way cryptographic hashing
US7404212B2 (en)2001-03-062008-07-22Cybersoft, Inc.Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer
US7373643B2 (en)*2001-03-062008-05-13Cybersoft, Inc.Apparatus, methods and articles of manufacture for data transmission
US7647402B2 (en)2001-03-082010-01-12International Business Machines CorporationProtecting contents of computer data files from suspected intruders by renaming and hiding data files subjected to intrusion
AU2002252287A1 (en)2001-03-122002-09-24Smart Mediary Systems, LlcMany-to-many mediated commercial electronic publishing
US7284271B2 (en)2001-03-142007-10-16Microsoft CorporationAuthorizing a requesting entity to operate upon data structures
US7302584B2 (en)2001-03-162007-11-27Mcafee, Inc.Mechanisms for banning computer programs from use
EP1372063A4 (en)2001-03-192008-03-19Sony CorpSoftware updating system, software updating method, and software updating program
US20020144130A1 (en)2001-03-292002-10-03Koninklijke Philips Electronics N.V.Apparatus and methods for detecting illicit content that has been imported into a secure domain
US7114184B2 (en)2001-03-302006-09-26Computer Associates Think, Inc.System and method for restoring computer systems damaged by a malicious computer program
IL142487A0 (en)2001-04-052003-09-17Hexalock LtdMethod and system for protecting data
JP3946965B2 (en)2001-04-092007-07-18ソニー株式会社 Recording apparatus, recording method, recording medium, and program for recording information protecting intangible property rights
US6966000B2 (en)2001-04-132005-11-15Ge Medical Technology Services, Inc.Method and system to remotely grant limited access to software options resident on a device
US7502939B2 (en)2001-04-192009-03-10Cybersoft, Inc.Software virus detection methods and apparatus
US7043634B2 (en)2001-05-152006-05-09Mcafee, Inc.Detecting malicious alteration of stored computer files
US7188368B2 (en)2001-05-252007-03-06Lenovo (Singapore) Pte. Ltd.Method and apparatus for repairing damage to a computer system using a system rollback mechanism
US6643653B1 (en)2001-06-012003-11-04Oracle International CorporationMethod and apparatus for identifying a data sequence related to a given data sequence
DE60203711T2 (en)2001-06-122006-03-02International Business Machines Corp. METHOD FOR AUTHENTICATING MULTIPLE FILES ASSOCIATED WITH A TEXT DOCUMENT
US7213148B2 (en)2001-06-132007-05-01Corrent CorporationApparatus and method for a hash processing system using integrated message digest and secure hash architectures
US7249255B2 (en)2001-06-132007-07-24Corrent CorporationApparatus and method for a hash processing system using multiple hash storage areas
US20020194490A1 (en)2001-06-182002-12-19Avner HalperinSystem and method of virus containment in computer networks
US7203966B2 (en)2001-06-272007-04-10Microsoft CorporationEnforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
FI118358B (en)2001-06-292007-10-15Sanako Oy A method for controlling the use of digital media content
KR100762276B1 (en)2001-07-172007-10-01샤프 가부시키가이샤 Apparatus and method for generating forgery detection data of encrypted data in process
US7487544B2 (en)2001-07-302009-02-03The Trustees Of Columbia University In The City Of New YorkSystem and methods for detection of new malicious executables
US7146524B2 (en)2001-08-032006-12-05Isilon Systems, Inc.Systems and methods for providing a distributed file system incorporating a virtual hot spare
AU2002323431A1 (en)2001-08-272003-03-10Dataplay, Inc.A secure access method and system
US6662198B2 (en)*2001-08-302003-12-09Zoteca Inc.Method and system for asynchronous transmission, backup, distribution of data and file sharing
US6826601B2 (en)2001-09-062004-11-30Bea Systems, Inc.Exactly one cache framework
US7234167B2 (en)2001-09-062007-06-19Mcafee, Inc.Automatic builder of detection and cleaning routines for computer viruses
US7260725B2 (en)2001-09-142007-08-21Computer Associates Think, Inc.Virus detection system
US7266844B2 (en)2001-09-272007-09-04Mcafee, Inc.Heuristic detection of polymorphic computer viruses based on redundancy in viral code
US20030074578A1 (en)2001-10-162003-04-17Richard FordComputer virus containment
US6654751B1 (en)2001-10-182003-11-25Networks Associates Technology, Inc.Method and apparatus for a virus information patrol
FR2841409B1 (en)2001-10-192004-07-30Marc Viot DATA PROTECTION METHOD AND DEVICE
WO2003036505A1 (en)2001-10-242003-05-01Bea Systems, Inc.System and method for delegated administration
US7444393B2 (en)2001-10-302008-10-28Keicy K. ChungRead-only storage device having network interface, a system including the device, and a method of distributing files over a network
US20030159060A1 (en)2001-10-312003-08-21Gales George S.System and method of defining the security condition of a computer system
US8387111B2 (en)2001-11-012013-02-26International Business Machines CorporationType independent permission based access control
US20030084325A1 (en)2001-11-012003-05-01International Business Machines CorporationMethod and apparatus for implementing permission based access control through permission type inheritance
US7603440B1 (en)*2001-11-092009-10-13Persystent Technology CorporationSystem and method for management of end user computing devices
US6816985B2 (en)2001-11-132004-11-09Sun Microsystems, Inc.Method and apparatus for detecting corrupt software code
US7243230B2 (en)2001-11-162007-07-10Microsoft CorporationTransferring application secrets in a trusted operating system environment
JP2003150424A (en)2001-11-162003-05-23Fujitsu Ltd File system, control method, and program
US7840488B2 (en)2001-11-202010-11-23Contentguard Holdings, Inc.System and method for granting access to an item or permission to use an item based on configurable conditions
JP2003223363A (en)2001-11-212003-08-08Ricoh Co Ltd Document processing device
US20030101234A1 (en)2001-11-282003-05-29International Business Machines CorporationSystem and method for indicating whether a document is cached
US20030101381A1 (en)2001-11-292003-05-29Nikolay MateevSystem and method for virus checking software
JP3914757B2 (en)2001-11-302007-05-16デュアキシズ株式会社 Apparatus, method and system for virus inspection
US7234164B2 (en)2001-11-302007-06-19Computer Associates Think, Inc.Method and system for blocking execution of malicious code
US20030105973A1 (en)2001-12-042003-06-05Trend Micro IncorporatedVirus epidemic outbreak command system and method using early warning monitors in a network environment
US7062553B2 (en)2001-12-042006-06-13Trend Micro, Inc.Virus epidemic damage control system and method for network environment
US7631184B2 (en)2002-05-142009-12-08Nicholas RyanSystem and method for imposing security on copies of secured items
US20030110169A1 (en)2001-12-122003-06-12Secretseal Inc.System and method for providing manageability to security information for secured items
US7783765B2 (en)2001-12-122010-08-24Hildebrand Hal SSystem and method for providing distributed access control to secured documents
US10033700B2 (en)2001-12-122018-07-24Intellectual Ventures I LlcDynamic evaluation of access rights
US7260555B2 (en)2001-12-122007-08-21Guardian Data Storage, LlcMethod and architecture for providing pervasive security to digital assets
US7058975B2 (en)2001-12-142006-06-06Mcafee, Inc.Method and system for delayed write scanning for detecting computer malwares
DE10162291A1 (en)2001-12-192003-07-03Philips Intellectual PropertyMethod for preventing unauthorized execution of a computer program, especially for preventing unauthorized execution of a ROM based self-test of a smart card, by incorporation of an internal signature within the self-test routine
WO2003054724A2 (en)2001-12-202003-07-03Douglas MonahanFile identification system and method
US7398389B2 (en)2001-12-202008-07-08Coretrace CorporationKernel-based network security infrastructure
GB0130805D0 (en)2001-12-222002-02-06Koninkl Philips Electronics NvDealing with a computer virus which self-propagates by e-mail
US7114185B2 (en)2001-12-262006-09-26Mcafee, Inc.Identifying malware containing computer files using embedded text
US7415726B2 (en)2001-12-282008-08-19Mcafee, Inc.Controlling access to suspicious files
TWI286701B (en)2002-01-092007-09-11Via Tech IncProcess for avoiding system infection of software viruses
US7168008B2 (en)2002-01-182007-01-23Mobitv, Inc.Method and system for isolating and protecting software components
US7363506B2 (en)2002-01-302008-04-22Cybersoft, Inc.Software virus detection methods, apparatus and articles of manufacture
US7249379B2 (en)2002-02-012007-07-24Systems Advisory Group Enterprises, Inc.Method and apparatus for implementing process-based security in a computer system
US20030154394A1 (en)2002-02-132003-08-14Levin Lawrence R.Computer virus control
JP4088082B2 (en)2002-02-152008-05-21株式会社東芝 Apparatus and program for preventing infection by unknown computer virus
US20030158872A1 (en)2002-02-192003-08-21Media Vu, LlcMethod and system for checking content before dissemination
AU2003219823A1 (en)2002-02-202003-09-09Bitpipe, Inc.Electronic document tracking
US7631196B2 (en)2002-02-252009-12-08Intel CorporationMethod and apparatus for loading a trustable operating system
US7096498B2 (en)2002-03-082006-08-22Cipher Trust, Inc.Systems and methods for message threat management
EP1488330B1 (en)2002-03-152014-05-07Shinkuro, Inc.Method for forming groups
JP4078454B2 (en)2002-03-222008-04-23株式会社日立製作所 Digital signature management method, digital signature processing apparatus, program, and recording medium
US20030178381A1 (en)2002-03-222003-09-25Linda LiangCollapsible article holder
US20030182561A1 (en)2002-03-252003-09-25International Business Machines CorporationTamper detection mechanism for a personal computer and a method of use thereof
EP1349033B1 (en)2002-03-262004-03-31Soteres GmbHA method of protecting the integrity of a computer program
US20030187848A1 (en)2002-04-022003-10-02Hovhannes GhukasyanMethod and apparatus for restricting access to a database according to user permissions
WO2003085532A1 (en)2002-04-022003-10-16Corporation For National Research InitiativesAuthenticating and using digital objects
US20030192041A1 (en)2002-04-032003-10-09Mentze Duane E.software distribution system and method
AU2003227314A1 (en)2002-04-032003-10-13Invisicom, Inc.Protection of data by hiding the data
JP2004005008A (en)2002-04-042004-01-08Scinet CorpProtection method for contents of writing in electronic publication distribution
US7543333B2 (en)2002-04-082009-06-02Microsoft CorporationEnhanced computer intrusion detection methods and systems
ATE426858T1 (en)2002-04-132009-04-15Computer Ass Think Inc SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE
US6782477B2 (en)2002-04-162004-08-24Song Computer Entertainment America Inc.Method and system for using tamperproof hardware to provide copy protection and online security
US6715085B2 (en)2002-04-182004-03-30International Business Machines CorporationInitializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
DE10217862A1 (en)2002-04-222003-11-13Fraunhofer Ges Forschung Method for labeling a virtual goods and device for providing a label for a virtual goods
US6976023B2 (en)2002-04-232005-12-13International Business Machines CorporationSystem and method for managing application specific privileges in a content management system
US6782349B2 (en)2002-05-032004-08-24International Business Machines CorporationMethod and system for updating a root of trust measurement function in a personal computer
EP2110975A1 (en)2002-05-062009-10-21Bentley Systems, IncorporatedMethod and system for digital signatures
US20040111632A1 (en)2002-05-062004-06-10Avner HalperinSystem and method of virus containment in computer networks
US8327446B2 (en)2002-05-062012-12-04Trend Micro Inc.Antivirus stand-alone network or internet appliance and methods therefor
WO2003100556A2 (en)2002-05-202003-12-04Smarte Solutions, Inc.Cd media anti-piracy generation and management system and process
US7409717B1 (en)2002-05-232008-08-05Symantec CorporationMetamorphic computer virus detection
GB0212315D0 (en)2002-05-282002-07-10Symbian LtdSecure mobile wireless device with protected file systems
US7065759B2 (en)2002-06-182006-06-20Hewlett-Packard Development Company, L.P.System and method for assigning basic blocks to computer control flow paths
US20030236995A1 (en)2002-06-212003-12-25Fretwell Lyman JeffersonMethod and apparatus for facilitating detection of network intrusion
US20060031381A1 (en)2002-07-242006-02-09Koninklijke Philips Electrices N.V.Method and device for regulating file sharing
NL1021300C2 (en)2002-08-192004-03-01Tno Computer network security.
US20040044628A1 (en)2002-08-272004-03-04Microsoft CorporationMethod and system for enforcing online identity consent polices
US7748039B2 (en)2002-08-302010-06-29Symantec CorporationMethod and apparatus for detecting malicious code in an information handling system
US7832011B2 (en)2002-08-302010-11-09Symantec CorporationMethod and apparatus for detecting malicious code in an information handling system
US7401221B2 (en)2002-09-042008-07-15Microsoft CorporationAdvanced stream format (ASF) data stream header object protection
US7225461B2 (en)2002-09-042007-05-29Hitachi, Ltd.Method for updating security information, client, server and management computer therefor
US20040054893A1 (en)2002-09-182004-03-18Anthony EllisMethod and system for a file encryption and monitoring system
US20040073607A1 (en)2002-09-252004-04-15Su Chi ChungMultimedia messaging system and method
US7334219B2 (en)2002-09-302008-02-19Ensco, Inc.Method and system for object level software testing
US7188369B2 (en)2002-10-032007-03-06Trend Micro, Inc.System and method having an antivirus virtual scanning processor with plug-in functionalities
US20040068559A1 (en)2002-10-042004-04-08Shaw Terry D.Method for detection of unauthorized computer system usage
US7337471B2 (en)2002-10-072008-02-26Symantec CorporationSelective detection of malicious computer code
US7469419B2 (en)2002-10-072008-12-23Symantec CorporationDetection of malicious computer code
US20040073789A1 (en)2002-10-152004-04-15Powers John StephensonMethod for collaborative software licensing of electronically distributed computer programs
JP4400059B2 (en)2002-10-172010-01-20株式会社日立製作所 Policy setting support tool
US20040078580A1 (en)2002-10-182004-04-22Trend Micro IncorporatedAntivirus network system and method for handling electronic mails infected by computer viruses
US20040128169A1 (en)2002-10-182004-07-01Lusen William D.Multiple organization data access monitoring and management system
US7039833B2 (en)2002-10-212006-05-02I2 Technologies Us, Inc.Stack trace generated code compared with database to find error resolution information
JP2004151195A (en)2002-10-292004-05-27Sony CorpDevice and method for communication, program, storage medium, and terminal device
US7278019B2 (en)2002-11-042007-10-02Hewlett-Packard Development Company, L.P.Method of hindering the propagation of a computer virus
US7984435B2 (en)2002-11-132011-07-19Hewlett-Packard Development Company, L.P.Update system employing reference software to reduce number of update packages
WO2004044756A1 (en)2002-11-142004-05-27Mobidata Group Pty LimitedSystem and method relating to remotely accessible securely stored data files
US7484219B2 (en)2002-11-212009-01-27Microsoft CorporationSynchronizing centralized data store from distributed independent data stores using fixed application programming interfaces
US6786076B2 (en)2002-11-252004-09-07Reliable Instruments LlcThin film gas sensor
US7440571B2 (en)2002-12-032008-10-21Nagravision S.A.Method for securing software updates
US7020804B2 (en)2002-12-032006-03-28Lockheed Martin CorporationTest data generation system for evaluating data cleansing applications
US8024781B2 (en)2002-12-042011-09-20Microsoft CorporationSigning-in to software applications having secured features
US7428751B2 (en)2002-12-052008-09-23Microsoft CorporationSecure recovery in a serverless distributed file system
US20040111414A1 (en)2002-12-062004-06-10International Business Machines CorporationSystem and method for selective execution of statements with surrogate authority
US7024689B2 (en)2002-12-132006-04-04Intuit, Inc.Granting access rights to unattended software
US7120635B2 (en)2002-12-162006-10-10International Business Machines CorporationEvent-based database access execution
US7373664B2 (en)2002-12-162008-05-13Symantec CorporationProactive protection against e-mail worms and spam
US7631353B2 (en)2002-12-172009-12-08Symantec CorporationBlocking replication of e-mail worms
US7418730B2 (en)2002-12-172008-08-26International Business Machines CorporationAutomatic client responses to worm or hacker attacks
US20040123117A1 (en)2002-12-182004-06-24Symantec CorporationValidation for behavior-blocking system
US7594111B2 (en)2002-12-192009-09-22Massachusetts Institute Of TechnologySecure execution of a computer program
EP1573478A2 (en)2002-12-192005-09-14International Business Machines CorporationA method for distributing software licenses using xml documents
US7305564B2 (en)2002-12-192007-12-04International Business Machines CorporationSystem and method to proactively detect software tampering
US7013483B2 (en)2003-01-032006-03-14Aladdin Knowledge Systems Ltd.Method for emulating an executable code in order to detect maliciousness
US7533148B2 (en)2003-01-092009-05-12Microsoft CorporationFramework to enable integration of anti-spam technologies
US7200598B2 (en)2003-01-162007-04-03Hewlett-Packard Development Company, L.P.System and method for efficiently replicating a file among a plurality of recipients having improved scalability
US20040143749A1 (en)2003-01-162004-07-22Platformlogic, Inc.Behavior-based host-based intrusion prevention system
US7174334B2 (en)2003-01-162007-02-06Hewlett-Packard Development Company, L.P.System and method for efficiently replicating a file among a plurality of recipients
US20040153644A1 (en)2003-02-052004-08-05Mccorkendale BrucePreventing execution of potentially malicious software
US7228563B2 (en)2003-02-062007-06-05Symantec CorporationShell code blocking system and method
US7293290B2 (en)2003-02-062007-11-06Symantec CorporationDynamic detection of computer worms
US20040158730A1 (en)2003-02-112004-08-12International Business Machines CorporationRunning anti-virus software on a network attached storage device
US20040162781A1 (en)2003-02-142004-08-19Kennsco, Inc.Monitoring and alert systems and methods
WO2004072834A1 (en)2003-02-142004-08-26Whale Communications Ltd.System and method for providing conditional access to server-based applications from remote access devices
US7565551B2 (en)2003-02-192009-07-21Microsoft CorporationEnhancing software integrity through installation and verification
EP2182465B1 (en)2003-02-212013-05-01Research In Motion LimitedSystem and method of multiple-level control of electronic devices
US20040168005A1 (en)2003-02-212004-08-26Sun Microsystems, Inc.Methods for interrupting a program and for obtaining program execution acquisition
JP2004258777A (en)2003-02-242004-09-16Fujitsu Ltd Security management device, security management system, security management method, security management program
US7478096B2 (en)2003-02-262009-01-13Burnside Acquisition, LlcHistory preservation in a computer storage system
JP4077336B2 (en)2003-02-262008-04-16富士通株式会社 Anomaly detection method, anomaly detection program, server, computer
US7555749B2 (en)2003-03-102009-06-30Microsoft CorporationSoftware updating system and method
WO2004081758A2 (en)2003-03-122004-09-23Digex, Inc.System and method for maintaining installed software compliance with build standards
FR2852413B1 (en)2003-03-122005-05-20 SECURE, INVIOLABLE AND INFALSIFIABLE DEVICE FOR THE STORAGE OF AUTHENTICATED AND DATED DATA WITH LEGAL OR LEGAL VALUE
KR20040080844A (en)2003-03-142004-09-20주식회사 안철수연구소Method to detect malicious scripts using static analysis
KR100509650B1 (en)2003-03-142005-08-23주식회사 안철수연구소Method to detect malicious scripts using code insertion technique
US7185015B2 (en)2003-03-142007-02-27Websense, Inc.System and method of monitoring and controlling application files
KR100503386B1 (en)2003-03-142005-07-26주식회사 안철수연구소Method to detect malicious code patterns with due regard to control and data flow
US7584467B2 (en)2003-03-172009-09-01Microsoft CorporationSoftware updating system and method
US7546638B2 (en)2003-03-182009-06-09Symantec CorporationAutomated identification and clean-up of malicious computer code
JP3835421B2 (en)2003-03-282006-10-18コニカミノルタビジネステクノロジーズ株式会社 Control program and control device
JP3945438B2 (en)2003-03-282007-07-18コニカミノルタビジネステクノロジーズ株式会社 Control program and control device
GB2403820A (en)2003-03-282005-01-12Hewlett Packard Development CoSecurity policy in trusted computing systems
US7353535B2 (en)2003-03-312008-04-01Microsoft CorporationFlexible, selectable, and fine-grained network trust policies
US8171551B2 (en)2003-04-012012-05-01Mcafee, Inc.Malware detection using external call characteristics
FR2853742B1 (en)2003-04-082005-07-08Regie Autonome Transports CENTRALIZED INFORMATION BACKUP SYSTEM
US20040205419A1 (en)2003-04-102004-10-14Trend Micro IncorporatedMultilevel virus outbreak alert based on collaborative behavior
US7788724B2 (en)2003-04-102010-08-31Symantec CorporationSystem and method for detecting malicious applications
GB2400463B (en)2003-04-112005-05-25NextendersData processing apparatus and method for distributing and authenticating electronic documents
US7254811B2 (en)2003-04-172007-08-07Ntt Docomo, Inc.Update system and method for updating a scanning subsystem in a mobile communication framework
WO2004095176A2 (en)2003-04-182004-11-04Ounce Labs, Inc.Detecting vulnerabilities in source code
US7587422B2 (en)2003-04-242009-09-08Neopath Networks, Inc.Transparent file replication using namespace replication
US20040215656A1 (en)2003-04-252004-10-28Marcus DillAutomated data mining runs
US7139781B2 (en)2003-04-292006-11-21International Business Machines CorporationManaging filesystem versions
US7461395B2 (en)2003-05-062008-12-02Oracle International CorporationDistributed capability-based authorization architecture using roles
US7322029B2 (en)2003-05-082008-01-22American Megatrends, Inc.Method and system for recovering program code in a computer system
US20040225877A1 (en)2003-05-092004-11-11Zezhen HuangMethod and system for protecting computer system from malicious software operation
EP1634136A1 (en)2003-05-132006-03-15International Business Machines CorporationSystem for real-time healing of vital computer files
US7386617B2 (en)2003-05-152008-06-10International Business Machines CorporationMethod, system and program product for managing multiple network application versions
US7917751B2 (en)2003-05-222011-03-29International Business Machines CorporationDistributed filesystem network security extension
US20040250086A1 (en)2003-05-232004-12-09Harris CorporationMethod and system for protecting against software misuse and malicious code
US7257835B2 (en)2003-05-282007-08-14Microsoft CorporationSecurely authorizing the performance of actions
US7231667B2 (en)2003-05-292007-06-12Computer Associates Think, Inc.System and method for computer virus detection utilizing heuristic analysis
US7730033B2 (en)2003-06-132010-06-01Microsoft CorporationMechanism for exposing shadow copies in a networked environment
MXPA06000102A (en)2003-06-232006-06-27Sony Pictures EntertainmentFingerprinting of data.
US20050005105A1 (en)2003-06-242005-01-06Brown Larry CecilRemote access control feature for limiting access to configuration file components
US7567991B2 (en)2003-06-252009-07-28Emc CorporationReplication of snapshot using a file system copy differential
JP4150854B2 (en)2003-06-272008-09-17日本電気株式会社 Access system and client for shared disk device on storage area network
US7155484B2 (en)2003-06-302006-12-26Bellsouth Intellectual Property CorporationFiltering email messages corresponding to undesirable geographical regions
US20040267837A1 (en)2003-06-302004-12-30Nokia Inc.System and method for updating network appliances using urgent update notifications
US7596807B2 (en)2003-07-032009-09-29Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network
US20040172551A1 (en)2003-12-092004-09-02Michael ConnorFirst response computer virus blocking.
US7555777B2 (en)2004-01-132009-06-30International Business Machines CorporationPreventing attacks in a data processing system

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4809160A (en)*1985-10-281989-02-28Hewlett-Packard CompanyPrivilege level checking instruction for implementing a secure hierarchical computer system
US4908861A (en)*1987-08-281990-03-13International Business Machines CorporationData authentication using modification detection codes based on a public one way encryption function
US5283830A (en)*1991-12-171994-02-01International Computers LimitedSecurity mechanism for a computer system
US5502815A (en)*1992-03-301996-03-26Cozza; Paul D.Method and apparatus for increasing the speed at which computer viruses are detected
US5278901A (en)*1992-04-301994-01-11International Business Machines CorporationPattern-oriented intrusion-detection system and method
US5495571A (en)*1992-09-301996-02-27Microsoft CorporationMethod and system for performing parametric testing of a functional programming interface
US5613107A (en)*1992-12-221997-03-18Bull, S.A.Method and apparatus for managing file versions in an information processing system based on a predetermined amount of storage media
US6195587B1 (en)*1993-10-292001-02-27Sophos PlcValidity checking
US5495533A (en)*1994-04-291996-02-27International Business Machines CorporationPersonal key archive
US5613002A (en)*1994-11-211997-03-18International Business Machines CorporationGeneric disinfection of programs infected with a computer virus
US5485575A (en)*1994-11-211996-01-16International Business Machines CorporationAutomatic analysis of a computer virus structure and means of attachment to its hosts
US5708780A (en)*1995-06-071998-01-13Open Market, Inc.Internet server access control and monitoring systems
US5859966A (en)*1995-10-101999-01-12Data General CorporationSecurity system for computer systems
US6029175A (en)*1995-10-262000-02-22Teknowledge CorporationAutomatic retrieval of changed files by a network software agent
US5708709A (en)*1995-12-081998-01-13Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US6178508B1 (en)*1995-12-282001-01-23International Business Machines Corp.System for controlling access to encrypted data files by a plurality of users
US6021491A (en)*1996-11-272000-02-01Sun Microsystems, Inc.Digital signatures for data streams and data archives
US6026205A (en)*1997-01-212000-02-15Molecular Optoelectronics CorporationCompound optical waveguide and filter applications thereof
US6026502A (en)*1997-01-272000-02-15Wakayama; HironoriMethod and mechanism for preventing from invading of computer virus and/or hacker
US6173284B1 (en)*1997-05-202001-01-09University Of Charlotte City Of CharlotteSystems, methods and computer program products for automatically monitoring police records for a crime profile
US6681227B1 (en)*1997-11-192004-01-20Ns Solutions CorporationDatabase system and a method of data retrieval from the system
US6516395B1 (en)*1997-11-202003-02-04Advanced Micro Devices, Inc.System and method for controlling access to a privilege-partitioned address space with a fixed set of attributes
US6021510A (en)*1997-11-242000-02-01Symantec CorporationAntivirus accelerator
US6018747A (en)*1997-11-262000-01-25International Business Machines CorporationMethod for generating and reconstructing in-place delta files
US6023723A (en)*1997-12-222000-02-08Accepted Marketing, Inc.Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
US6029256A (en)*1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6026402A (en)*1998-01-072000-02-15Hewlett-Packard CompanyProcess restriction within file system hierarchies
US6513111B2 (en)*1998-02-092003-01-28Reuters, LtdMethod of controlling software applications specific to a group of users
US6023586A (en)*1998-02-102000-02-08Novell, Inc.Integrity verifying and correcting software
US6684210B1 (en)*1998-04-062004-01-27Matsushita Electric Industrial Co., Ltd.File managing system, file management apparatus, file management method, and program storage medium
US20020002684A1 (en)*1998-05-012002-01-03Barbara L. FoxIntelligent trust management method and system
US6505300B2 (en)*1998-06-122003-01-07Microsoft CorporationMethod and system for secure running of untrusted content
US6505237B2 (en)*1998-07-242003-01-07Siemens Information & Communication Networks, Inc.Method and system for management of message attachments
US6338149B1 (en)*1998-07-312002-01-08Westinghouse Electric Company LlcChange monitoring system for a computer system
US6338141B1 (en)*1998-09-302002-01-08Cybersoft, Inc.Method and apparatus for computer virus detection, analysis, and removal in real time
US6349311B1 (en)*1999-02-012002-02-19Symantec CorporationStorage of reverse delta updates
US6678741B1 (en)*1999-04-092004-01-13Sun Microsystems, Inc.Method and apparatus for synchronizing firmware
US20020019932A1 (en)*1999-06-102002-02-14Eng-Whatt TohCryptographically secure network
US6513039B1 (en)*1999-06-242003-01-28International Business Machines CorporationProfile inferencing through automated access control list analysis heuristics
US6675205B2 (en)*1999-10-142004-01-06Arcessa, Inc.Peer-to-peer automated anonymous asynchronous file sharing
US6351776B1 (en)*1999-11-042002-02-26Xdrive, Inc.Shared internet storage resource, user interface system, and method
US6681387B1 (en)*1999-12-012004-01-20Board Of Trustees Of The University Of IllinoisMethod and apparatus for instruction execution hot spot detection and monitoring in a data processing unit
US6697950B1 (en)*1999-12-222004-02-24Networks Associates Technology, Inc.Method and apparatus for detecting a macro computer virus using static analysis
US6694328B1 (en)*2000-01-132004-02-17International Business Machines CorporationMethod for creating queries on version objects
US6694336B1 (en)*2000-01-252004-02-17Fusionone, Inc.Data transfer and synchronization system
US20020005017A1 (en)*2000-03-312002-01-17Jsr CorporationAqueous dispersion for chemical mechanical polishing
US20020004874A1 (en)*2000-05-012002-01-10Hideyuki AgataApparatus and method for processing information, and program and medium used therefor
US20020005105A1 (en)*2000-05-092002-01-17Mcpherson MathewArrangement of a sound hole and construction of a sound board in an acoustic guitar
US20040034794A1 (en)*2000-05-282004-02-19Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20020004908A1 (en)*2000-07-052002-01-10Nicholas Paul Andrew GaleaElectronic mail message anti-virus system and method
US20020004902A1 (en)*2000-07-072002-01-10Eng-Whatt TohSecure and reliable document delivery
US20020026576A1 (en)*2000-08-182002-02-28Hewlett-Packard CompanyApparatus and method for establishing trust
US6681344B1 (en)*2000-09-142004-01-20Microsoft CorporationSystem and method for automatically diagnosing a computer problem
US20040039921A1 (en)*2000-10-172004-02-26Shyne-Song ChuangMethod and system for detecting rogue software
US6839721B2 (en)*2001-01-122005-01-04Hewlett-Packard Development Company, L.P.Integration of a database into file management software for protecting, tracking, and retrieving data
US6694457B2 (en)*2001-03-062004-02-17Hewlett-Packard Development Company, L.P.System and method for monitoring execution of privileged instructions
US20030018903A1 (en)*2001-03-192003-01-23Greca Damon G. DellaMethod of containing spread of computer viruses
US7483993B2 (en)*2001-04-062009-01-27Symantec CorporationTemporal access control for computer virus prevention
US20040039924A1 (en)*2001-04-092004-02-26Baldwin Robert W.System and method for security of computing devices
US6697810B2 (en)*2001-04-192004-02-24Vigilance, Inc.Security system for event monitoring, detection and notification system
US20050022004A1 (en)*2001-04-242005-01-27Microsoft CorporationRobust recognizer of perceptually similar content
US20030004922A1 (en)*2001-06-272003-01-02Ontrack Data International, Inc.System and method for data management
US6513122B1 (en)*2001-06-292003-01-28Networks Associates Technology, Inc.Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
US20030015973A1 (en)*2001-07-182003-01-23Kevin OvensSolid state traffic light with predictive failure analysis
US20030023867A1 (en)*2001-07-252003-01-30Thibadeau Robert H.Methods and systems for promoting security in a computer system employing attached storage devices
US20030023864A1 (en)*2001-07-252003-01-30Igor MuttikOn-access malware scanning
US20030023866A1 (en)*2001-07-262003-01-30Hinchliffe Alex JamesCentrally managed malware scanning
US20030023857A1 (en)*2001-07-262003-01-30Hinchliffe Alexander JamesMalware infection suppression
US20030023560A1 (en)*2001-07-272003-01-30Fujitsu LimitedDesign asset information search system
US20030028785A1 (en)*2001-08-012003-02-06Pak Michael Chin-HwanSystem and method for executing computer virus definitions containing general purpose programming language extensions
US20030033308A1 (en)*2001-08-032003-02-13Patel Sujal M.System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
US20030033303A1 (en)*2001-08-072003-02-13Brian CollinsSystem and method for restricting access to secured data
US20050033975A1 (en)*2001-08-172005-02-10Pasi LahtiPreventing virus infection in a computer system
US20040025043A1 (en)*2002-05-222004-02-05Microsoft CorporationSystem and method for identifying potential security risks in controls
US20040003279A1 (en)*2002-06-282004-01-01Beilinson Craig AdamUser controls for a computer
US20040003274A1 (en)*2002-06-282004-01-01Strom Clifford P.Protecting content on medium from unfettered distribution
US20040010602A1 (en)*2002-07-102004-01-15Van Vleck Paul F.System and method for managing access to digital content via digital rights policies
US20040034638A1 (en)*2002-07-182004-02-19International Business Machines CorporationMethod for analyzing and characterizing the usage pattern of a device
US20040019878A1 (en)*2002-07-232004-01-29Sreekrishna KotnurSoftware tool to detect and restore damaged or lost software components
US20040031028A1 (en)*2002-08-062004-02-12Aardwork Software LimitedUpdating of software
US20040030913A1 (en)*2002-08-082004-02-12Trend Micro IncorporatedSystem and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same
US20040039932A1 (en)*2002-08-232004-02-26Gidon ElazarApparatus, system and method for securing digital documents in a digital appliance
US20050022016A1 (en)*2002-12-122005-01-27Alexander ShippMethod of and system for heuristically detecting viruses in executable code
US20050010804A1 (en)*2002-12-192005-01-13Bruening Derek L.Secure execution of a computer program using a code cache
US20050004873A1 (en)*2003-02-032005-01-06Robin PouDistribution and rights management of digital content
US20050005168A1 (en)*2003-03-112005-01-06Richard DickVerified personal information database
US20050010806A1 (en)*2003-04-182005-01-13Ounce Labs, Inc.Method and system for detecting privilege escalation vulnerabilities in source code
US20050015591A1 (en)*2003-06-122005-01-20International Business Machines CorporationMulti-level multi-user web services security system and method
US20050022018A1 (en)*2003-06-302005-01-27Symantec CorporationSignature extraction system and method
US20050004954A1 (en)*2003-07-012005-01-06Hand Held Products, Inc.Systems and methods for expedited data transfer in a communication system using hash segmentation
US20050015675A1 (en)*2003-07-032005-01-20Kolawa Adam K.Method and system for automatic error prevention for computer software
US20050005161A1 (en)*2003-07-042005-01-06Adrian BaldwinServices and secure processing environments
US20050015592A1 (en)*2003-07-152005-01-20Jeou-Kai LinSystem and method for application and user-based class of security
US20050015760A1 (en)*2003-07-162005-01-20Oleg IvanovAutomatic detection and patching of vulnerable files
US20050021994A1 (en)*2003-07-212005-01-27Barton Christopher AndrewPre-approval of computer files during a malware detection
US20050028002A1 (en)*2003-07-292005-02-03Mihai ChristodorescuMethod and apparatus to detect malicious software
US20050033976A1 (en)*2003-08-042005-02-10Sbc Knowledge Ventures, L.P.Host intrusion detection and isolation
US20050033980A1 (en)*2003-08-072005-02-10Willman Bryan MarkProjection of trustworthiness from a trusted environment to an untrusted environment
US20050033978A1 (en)*2003-08-082005-02-10Hyser Chris D.Method and system for securing a computer system

Cited By (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9059956B2 (en)2003-01-312015-06-16Good Technology CorporationAsynchronous real-time retrieval of data
US9665708B2 (en)2004-12-032017-05-30Fortinet, Inc.Secure system for allowing the execution of authorized computer program code
US9842203B2 (en)2004-12-032017-12-12Fortinet, Inc.Secure system for allowing the execution of authorized computer program code
US9305159B2 (en)2004-12-032016-04-05Fortinet, Inc.Secure system for allowing the execution of authorized computer program code
US8161548B1 (en)2005-08-152012-04-17Trend Micro, Inc.Malware detection using pattern classification
US7930289B2 (en)2005-11-122011-04-19Apple Inc.Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier
US20070112814A1 (en)*2005-11-122007-05-17Cheshire Stuart DMethods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier
US20070112774A1 (en)*2005-11-122007-05-17Cheshire Stuart DMethods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier
US20140040403A1 (en)*2006-02-092014-02-06John SargentSystem, method and computer program product for gathering information relating to electronic content utilizing a dns server
US9246860B2 (en)*2006-02-092016-01-26Mcafee, Inc.System, method and computer program product for gathering information relating to electronic content utilizing a DNS server
US7840958B1 (en)*2006-02-172010-11-23Trend Micro, Inc.Preventing spyware installation
US7971257B2 (en)*2006-08-032011-06-28Symantec CorporationObtaining network origins of potential software threats
US20080034434A1 (en)*2006-08-032008-02-07Rolf RepasiObtaining network origins of potential software threats
US20080250100A1 (en)*2007-04-032008-10-09Sony CorporationInformation processing apparatus, information processing method and computer program
US7991832B2 (en)*2007-04-032011-08-02Sony CorporationInformation processing apparatus, information processing method and computer program
US7854002B2 (en)2007-04-302010-12-14Microsoft CorporationPattern matching for spyware detection
US9628513B2 (en)2007-04-302017-04-18Mcafee, Inc.Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites
US20080271147A1 (en)*2007-04-302008-10-30Microsoft CorporationPattern matching for spyware detection
US20150180888A1 (en)*2007-06-052015-06-25Harish BalasubramanianSystem, Method and Computer Program Product for Making a Scan Decision During Communication of Data Over a Network
US8589181B2 (en)2007-07-062013-11-19Mckesson Financial HoldingsSystems and methods for managing medical information
US20090012813A1 (en)*2007-07-062009-01-08Mckesson Financial Holdings LimitedSystems and methods for managing medical information
US8670999B2 (en)2007-07-062014-03-11Mckesson Financial HoldingsSystems and methods for managing medical information
US20090077218A1 (en)*2007-09-142009-03-19Softkvm LlcSoftware Method And System For Controlling And Observing Computer Networking Devices
US20090077428A1 (en)*2007-09-142009-03-19Softkvm LlcSoftware Method And System For Controlling And Observing Computer Networking Devices
US8819655B1 (en)*2007-09-172014-08-26Symantec CorporationSystems and methods for computer program update protection
US20090172768A1 (en)*2007-12-282009-07-02Huifeng LeMethods and apparatus for operating embedded information technology applications with a service operating system
CN101539772A (en)*2008-01-252009-09-23洛克威尔自动控制技术股份有限公司Product lifecycle management method and apparatus
CN101286986B (en)*2008-05-152011-09-14成都市华为赛门铁克科技有限公司Active defense method, device and system
US8706745B1 (en)*2008-05-302014-04-22Symantec CorporationSystems and methods for determining a file set
US8607347B2 (en)*2008-09-292013-12-10Sophos LimitedNetwork stream scanning facility
US20100083380A1 (en)*2008-09-292010-04-01Harris Mark DNetwork stream scanning facility
US20100161608A1 (en)*2008-12-182010-06-24Sumooh Inc.Methods and apparatus for content-aware data de-duplication
US7925683B2 (en)2008-12-182011-04-12Copiun, Inc.Methods and apparatus for content-aware data de-duplication
US20100161685A1 (en)*2008-12-182010-06-24Sumooh Inc.Methods and apparatus for content-aware data partitioning
US8589455B2 (en)2008-12-182013-11-19Copiun, Inc.Methods and apparatus for content-aware data partitioning
US10693917B1 (en)2009-04-102020-06-23Open Invention Network LlcSystem and method for on-line and off-line streaming application isolation
US11616821B1 (en)*2009-04-102023-03-28International Business Machines CorporationSystem and method for streaming application isolation
US10606634B1 (en)2009-04-102020-03-31Open Invention Network LlcSystem and method for application isolation
US10592942B1 (en)2009-04-102020-03-17Open Invention Network LlcSystem and method for usage billing of hosted applications
US11314560B1 (en)2009-04-102022-04-26Open Invention Network LlcSystem and method for hierarchical interception with isolated environments
US10419504B1 (en)*2009-04-102019-09-17Open Invention Network LlcSystem and method for streaming application isolation
US11538078B1 (en)2009-04-102022-12-27International Business Machines CorporationSystem and method for usage billing of hosted applications
US20120198553A1 (en)*2009-09-142012-08-02Junko SuginakaSecure auditing system and secure auditing method
US9110915B2 (en)2009-12-182015-08-18Copiun, Inc.Highly scalable and distributed data de-duplication
US9135264B2 (en)2010-03-122015-09-15Copiun, Inc.Distributed catalog, data store, and indexing
US20110225141A1 (en)*2010-03-122011-09-15Copiun, Inc.Distributed Catalog, Data Store, and Indexing
US20110231374A1 (en)*2010-03-162011-09-22Copiun, Inc.Highly Scalable and Distributed Data De-Duplication
US8452739B2 (en)2010-03-162013-05-28Copiun, Inc.Highly scalable and distributed data de-duplication
US9621405B2 (en)2010-08-242017-04-11Good Technology Holdings LimitedConstant access gateway and de-duplicated data cache server
US20120066762A1 (en)*2010-09-132012-03-15Rade TodorovicSystem and method of whitelisting parent virtual images
US8407804B2 (en)*2010-09-132013-03-26Sophos PlcSystem and method of whitelisting parent virtual images
US20120150897A1 (en)*2010-12-082012-06-14International Business Machines CorporationCalculating State of Cryptographic Objects and Generating Search Filter for Querying Cryptographic Objects
US8788545B2 (en)*2010-12-082014-07-22International Business Machines CorporationCalculating state of cryptographic objects and generating search filter for querying cryptographic objects
US9298767B1 (en)2010-12-082016-03-29International Business Machines CorporationCalculating state of cryptographic objects and generating search filter for querying cryptographic objects
US9043920B2 (en)2012-06-272015-05-26Tenable Network Security, Inc.System and method for identifying exploitable weak points in a network
US9860265B2 (en)2012-06-272018-01-02Tenable Network Security, Inc.System and method for identifying exploitable weak points in a network
US10171490B2 (en)2012-07-052019-01-01Tenable, Inc.System and method for strategic anti-malware monitoring
US9088606B2 (en)2012-07-052015-07-21Tenable Network Security, Inc.System and method for strategic anti-malware monitoring
US10826975B2 (en)*2012-09-072020-11-03Oracle International CorporationSystem and method for providing java cloud services for use with a cloud computing environment
US10225323B2 (en)*2012-09-072019-03-05Oracle International CorporationSystem and method for providing java cloud services for use with a cloud computing environment
US20190166189A1 (en)*2012-09-072019-05-30Oracle International CorporationSystem and method for providing java cloud services for use with a cloud computing environment
US9602539B1 (en)*2012-09-282017-03-21Palo Alto Networks, Inc.Externally defined objects in security policy
US10404750B2 (en)*2012-09-282019-09-03Palo Alto Networks, Inc.Externally defined objects in security policy
US20170195369A1 (en)*2012-09-282017-07-06Palo Alto Networks, Inc.Externally defined objects in security policy
US9846706B1 (en)*2012-12-282017-12-19EMC IP Holding Company LLCManaging mounting of file systems
US9467464B2 (en)2013-03-152016-10-11Tenable Network Security, Inc.System and method for correlating log data to discover network vulnerabilities and assets
US20160119375A1 (en)*2013-06-042016-04-28Beijing Qihoo Technology Company LimitedCloud security-based file processing method and apparatus
US9948670B2 (en)*2013-06-042018-04-17Beijing Qihoo Technology Company LimitedCloud security-based file processing by generating feedback message based on signature information and file features
US10496812B2 (en)2013-09-062019-12-03Michael GuidrySystems and methods for security in computer systems
US10152518B2 (en)*2014-10-302018-12-11The Johns Hopkins UniversityApparatus and method for efficient identification of code similarity
US9680848B2 (en)*2014-12-032017-06-13Korea Internet & Security AgencyApparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and API flow-based dynamic analysis
US9544321B2 (en)*2015-01-302017-01-10Securonix, Inc.Anomaly detection using adaptive behavioral profiles
TWI595375B (en)*2015-01-302017-08-11瑟古爾歐尼克斯股份有限公司Anomaly detection using adaptive behavioral profiles
US20160226901A1 (en)*2015-01-302016-08-04Securonix, Inc.Anomaly Detection Using Adaptive Behavioral Profiles
CN108804925A (en)*2015-05-272018-11-13安恒通(北京)科技有限公司method and system for detecting malicious code
CN106096397A (en)*2016-05-262016-11-09倪茂志A kind of prevention method extorting software and system
US20170351870A1 (en)*2016-06-032017-12-07Honeywell International Inc.Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system
US10402577B2 (en)*2016-06-032019-09-03Honeywell International Inc.Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system
CN107948123A (en)*2016-10-122018-04-20阿里巴巴集团控股有限公司Document transmission method and device
US11375001B2 (en)2016-10-122022-06-28Alibaba Group Holding LimitedFile transmission method and apparatus
US20190121959A1 (en)*2017-08-012019-04-25PC Pitstop, IncSystem, Method, and Apparatus for Computer Security
US20210026951A1 (en)*2017-08-012021-01-28PC Matic, IncSystem, Method, and Apparatus for Computer Security
US11487868B2 (en)*2017-08-012022-11-01Pc Matic, Inc.System, method, and apparatus for computer security
US10873588B2 (en)2017-08-012020-12-22Pc Matic, Inc.System, method, and apparatus for computer security
US10783239B2 (en)*2017-08-012020-09-22Pc Matic, Inc.System, method, and apparatus for computer security
US11425170B2 (en)2018-10-112022-08-23Honeywell International Inc.System and method for deploying and configuring cyber-security protection solution using portable storage device
US10476936B1 (en)2018-12-132019-11-12Software AgPlugin-based file transfer systems and/or methods
US12061709B2 (en)*2019-08-012024-08-13Palantir Technologies Inc.Systems and methods for conducting data extraction using dedicated data extraction devices
US20210034767A1 (en)*2019-08-012021-02-04Palantir Technologies Inc.Systems and methods for conducting data extraction using dedicated data extraction devices
US11323482B2 (en)*2019-12-312022-05-03Mcafee, LlcMethods, systems, and media for protecting computer systems from user-created objects
US11237802B1 (en)2020-07-202022-02-01Bank Of America CorporationArchitecture diagram analysis tool for software development
CN114679410A (en)*2020-12-242022-06-28网神信息技术(北京)股份有限公司 Method, device, electronic device and storage medium for reducing external network resource occupation
US20220382892A1 (en)*2021-05-272022-12-01Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US11934548B2 (en)*2021-05-272024-03-19Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US20240241980A1 (en)*2021-05-272024-07-18Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US12259992B2 (en)*2021-05-272025-03-25Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US12216785B2 (en)*2022-09-212025-02-04Acronis International GmbhSystems and methods for generating file systems of data sources incompatible with anti-virus scanners
CN117707608A (en)*2024-02-042024-03-15深圳市分秒网络科技有限公司 Methods and systems for automating configuration file parameters
US12229261B1 (en)*2024-05-032025-02-18Halcyon Tech, Inc.Antiransomware file analysis and scoring

Also Published As

Publication numberPublication date
US8984636B2 (en)2015-03-17

Similar Documents

PublicationPublication DateTitle
US8984636B2 (en)Content extractor and analysis system
US8782800B2 (en)Parametric content control in a network security system
US7895651B2 (en)Content tracking in a network security system
US8272058B2 (en)Centralized timed analysis in a network security system
CA2617204C (en)Network security systems and methods
US20070028302A1 (en)Distributed meta-information query in a network
US12314396B2 (en)Systems and methods for providing security services during power management mode
US12294595B2 (en)Computer investigation method and system
US20090271863A1 (en)Identifying unauthorized privilege escalations
US20140165130A1 (en)Application-specific re-adjustment of computer security settings
US20110087899A1 (en)Firewall plus storage apparatus, method and system
US12292966B2 (en)Systems and methods for folder and file sequestration
US20240086538A1 (en)Computer investigation method and system for investigating authentication in remote host computers

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:BIT 9, INC., MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BRENNAN, TODD F.;REEL/FRAME:017004/0061

Effective date:20051012

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:4

ASAssignment

Owner name:CARBON BLACK, INC., MASSACHUSETTS

Free format text:CHANGE OF NAME;ASSIGNOR:BIT9, INC.;REEL/FRAME:050123/0127

Effective date:20160127

Owner name:BIT9, INC., MASSACHUSETTS

Free format text:CHANGE OF NAME;ASSIGNOR:BIT 9, INC.;REEL/FRAME:050123/0109

Effective date:20050425

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

ASAssignment

Owner name:VMWARE LLC, CALIFORNIA

Free format text:MERGER;ASSIGNOR:CARBON BLACK, LLC;REEL/FRAME:070019/0171

Effective date:20240820

Owner name:CARBON BLACK, LLC, CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:CARBON BLACK, INC.;REEL/FRAME:070023/0225

Effective date:20200122


[8]ページ先頭

©2009-2025 Movatter.jp